Home

Chapter 11: It’s a Network

  • 11.0 It’s a Network
    • 11.0.1 Introduction
      • 11.0.1.1 Introduction
      • 11.0.1.2 Activity – Did You Notice…?
  • 11.1 Create and Grow
    • 11.1.1 Devices in a Small Network
      • 11.1.1.1 Small Network Topologies
      • 11.1.1.2 Device Selection for a Small Network
      • 11.1.1.3 IP Addressing for a Small Network
      • 11.1.1.4 Redundancy in a Small Network
      • 11.1.1.5 Design Considerations for a Small Network
      • 11.1.1.6 Identifying Devices in a Small Network
    • 11.1.2 Protocols in a Small Network
      • 11.1.2.1 Common Applications in a Small Network
      • 11.1.2.2 Common Protocols in a Small Network
      • 11.1.2.3 Real-Time Applications for a Small Network
    • 11.1.3 Growing to Larger Networks
      • 11.1.3.1 Scaling a Small Network
      • 11.1.3.2 Protocol Analysis of a Small Network
      • 11.1.3.3 Evolving Protocol Requirements
  • 11.2 Keeping the Network Safe
    • 11.2.1 Network Device Security Measures
      • 11.2.1.1 Categories of Threats to Network Security
      • 11.2.1.2 Physical Security
      • 11.2.1.3 Types of Security Vulnerabilities
      • 11.2.1.4 Activity – Security Threats and Vulnerabilities
    • 11.2.2 Vulnerabilities and Network Attacks
      • 11.2.2.1 Viruses, Worms, and Trojan Horses
      • 11.2.2.2 Reconnaissance Attacks
      • 11.2.2.3 Access Attacks
      • 11.2.2.4 DoS Attacks
      • 11.2.2.5 Activity – Types of Attack
      • 11.2.2.6 Lab - Researching Network Security Threats
    • 11.2.3 Mitigating Network Attacks
      • 11.2.3.1 Backup, Upgrade, Update, and Patch
      • 11.2.3.2 Authentication, Authorization, and Accounting
      • 11.2.3.3 Firewalls
      • 11.2.3.4 Endpoint Security
    • 11.2.4 Securing Devices
      • 11.2.4.1 Introduction to Securing Devices
      • 11.2.4.2 Passwords
      • 11.2.4.3 Basic Security Practices
      • 11.2.4.4 Enable SSH
      • 11.2.4.5 Lab - Accessing Network Devices with SSH
      • 11.2.4.6 Lab - Securing Network Devices
  • 11.3 Basic Network Performance
    • 11.3.1 Ping
      • 11.3.1.1 Interpreting Ping Results
      • 11.3.1.2 Extended Ping
      • 11.3.1.3 Network Baseline
    • 11.3.2 Tracert
      • 11.3.2.1 Interpreting Tracert Messages
      • 11.3.2.2 Packet Tracer - Test Connectivity with Traceroute
      • 11.3.2.3 Lab - Testing Network Latency with Ping and Traceroute
    • 11.3.3 Show Commands
      • 11.3.3.1 Common show Commands Revisited
      • 11.3.3.2 Viewing Router Settings with the show version Command
      • 11.3.3.3 Viewing Switch Settings with the show version Command
      • 11.3.3.4 Packet Tracer - Using show Commands
    • 11.3.4 Host and IOS Commands
      • 11.3.4.1 ipconfig Command Options
      • 11.3.4.2 arp Command Options
      • 11.3.4.3 show cdp neighbors Command Options
      • 11.3.4.4 Using the show ip interface brief Command
      • 11.3.4.5 Activity – Show Commands
      • 11.3.4.6 Lab - Using the CLI to Gather Network Device Information.pdf
  • 11.4 Managing IOS Configuration Files
    • 11.4.1 Router and Switch File Systems
      • 11.4.1.1 Router File Systems
      • 11.4.1.2 Switch File Systems
    • 11.4.2 Back up and Restore Configuration files
      • 11.4.2.1 Backing up and Restoring using Text Files
      • 11.4.2.2 Backing up and Restoring using TFTP
      • 11.4.2.3 Using USB Ports on a Cisco Router
      • 11.4.2.4 Backing up and Restoring using a USB
      • 11.4.2.5 Packet Tracer - Backing up Configuration Files
      • 11.4.2.6 Lab - Managing Router Configuration Files with Tera Term
      • 11.4.2.7 Lab - Managing Device Configuration Files Using TFTP, Flash, and USB
      • 11.4.2.8 Lab - Researching Password Recovery Procedures
  • 11.5 Integrated Routing Services
    • 11.5.1 Integrated Router
      • 11.5.1.1 Multi-Function Device
      • 11.5.1.2 Types of Integrated Routers
      • 11.5.1.3 Wireless Capability
      • 11.5.1.4 Basic Security of Wireless
    • 11.5.2 Configuring the Integrated Router
      • 11.5.2.1 Configuring the Integrated Router
      • 11.5.2.2 Enabling Wireless
      • 11.5.2.3 Configure a Wireless Client
      • 11.5.2.4 Packet Tracer - Configuring a Linksys Router
  • 11.6 Summary
    • 11.6.1 Summary
      • 11.6.1.1 Capstone Project - Design and Build a Small Business Network
      • 11.6.1.2 Packet Tracer - Skills Integration Challenge
      • 11.6.1.3 Summary
  • Expand All
  • Collapse All