coverpage
Title Page
Copyright
Implementing Cisco Networking Solutions
Credits
About the Author
About the Reviewer
www.PacktPub.com
Why subscribe?
Customer Feedback
Dedication
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Downloading the example code
Downloading the color images of this book
Errata
Piracy
Questions
Network Building Essentials
Introduction to networks
The OSI model and the TCP/IP stack
Basic OSI reference model
Layer 1 - The physical layer
Layer 2 - The data link layer
Layer 3 - The network layer
Layer 4 - The transport layer
Layer 5 - The session layer
Layer 6 - The presentation layer
Layer 7 - The application layer
The TCP/IP model
Internet Protocol (IP)
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
IP version 6
Building a network
Purpose of networks
Network lifecycle
Advantages of network lifecycle approach
Prepare phase
Plan phase
Design phase
Implement phase
Operate phase
Optimize phase
Summary
Networks for Digital Enterprises
The impact of technology on business
Digitization as the key enabler
A digital-ready infrastructure
Enabling technologies
Input/output systems
IoT systems
Network
Software-defined networking
Network function virtualization
Network programmability
Processing centres
Edge computing
Cloud computing
Analytics
Network as the cornerstone
Network enabling new experiences
Network providing new Insights
Facets of a digital infrastructure
Functionality
Resiliency
Modularity
Flexibility
Scalability
Security
Agility
Manageability
Visibility and analytics
Cisco Digital Network Architecture
Summary
Components of the Enterprise Network
Networking devices and their functions
Switches
Wireless Access Points
Routers
Firewalls
Introduction to Cisco IOS
IOS command modes
Configuration files
Places in the network
Campus network
Wide Area Network (WAN)
Data center
Internet edge
Interdependency between the various components
Summary
Understanding and Configuring Campus Network Technologies
Campus network technologies
Layer 2 technologies
Ethernet
Ethernet switch and MAC-based forwarding
Virtual LANs
Access ports and trunk ports
Spanning Tree Protocols
Link aggregation
Address Resolution Protocol (ARP)
Configuring layer 2 protocols
Layer 3 technologies
IP addressing
IPv4 addresses
Routable and private addresses
Sample addressing
Configuring IP addresses
A note about WAN addresses
Secondary addresses
First Hop Redundancy Protocols (FHRP)
HSRP
VRRP
GLBP
Routing protocols
Routing table
Static routing
Dynamic routing
Distance vector routing
Link-state routing
External routing
Route redistribution
Routing table segmentation
Campus LAN design considerations
Topology choices
Ring and star topologies
Physical versus logical topology
Naming convention
Layer 2 versus layer 3 boundaries
Sizing the campus network
Stacking switches
A sample network
Summary
Understanding and Configuring Wireless Access Technologies
Benefits of wireless networks
Wireless fundamentals
An RF signal
Signal strength
Modulation
Signal to Noise Ratio (SNR)
Frequency bands
Channels
MIMO
Channel bonding
Antenna characteristics
Wireless standards
IEEE 802.11
IEEE 802.11a
IEEE 802.11b
IEEE 802.11g
IEEE 802.11n
IEEE 802.11ac
Mixed mode operation/interoperability
Configuring the WLAN
Cisco mobility express
Wireless LAN controller and CAPWAP
Configuring AP using Cisco Mobility Express
Configuration using the WLC
WLC redundancy
HA stateful switchover
Configuring the WLC deployment
FlexConnect mode
Configuring the APs in FlexConnect mode
Summary
Understanding and Configuring WAN Technologies
Considerations for a WAN design
WAN technology choices
Configuring WAN serial links
Serial links with PPP/HDLC encapsulation
FR encapsulation
Multilink PPP
Configuring overlay P2P links
Virtual private networks
Layer 2 VPNs
Layer 3 VPNs
VRF-Lite
Remote access VPNs
Managed versus unmanaged services
Connecting to the internet
Routing at the internet edge
Static routing
BGP
Encrypting and securing the WAN
Optimizing the WAN
Summary
Understanding and Configuring Data Center Technologies
Functions of a data center
Evolution of the DC
Network
Computers
Virtualization
Storage
Cloud computing
Management systems
Design of a DC
Application hierarchy
Zoning of the data center
Types of networks in a DC
Introduction to firewalls
Firewall inspection
Basic access control
Protecting from IP fragments
Application inspection
Applying connection limits and TCP normalization
Enabling threat detection
Firewall security context
Scaling the firewall
Connecting the DC to the internet
Network Address Translation
Designing a sample DC
Network design
Firewall design
Firewall redundancy
Server redundancy
NIC teaming
Virtualization
Server load balancers
Planning a disaster recovery
Providing remote access to the DC
Summary
Understanding and Configuring Network Security
Security landscape
Elements of enterprise security
Securing network infrastructure
Data plane security
Controlling network access
Password protection on wireless networks
Network access control (NAC)
Port security and MAC limiting
Preventing spoofed attacks
ARP spoofing
Unicast RPF
IP source guard
Limiting punting to CPU
IP options and source routing
ICMP attacks
Controlling user traffic
Rate limiting and storm control
Controlling user to user traffic
Access control lists
Preventing denial of service attacks
Control plane security
Disable unused services
Disabling unused global services
Disabling interface services
Layer 2 control plane security
STP security
DHCP snooping
Dynamic ARP Inspection (DAI)
Control plane policing
Protocol security
Management plane security
Security beyond the network devices
Securing the network perimeter
Firewalls
Securing services
Email services
Web security
Advanced Malware Protection (AMP)
Securing the endpoints
DNS-based security
Securing data in transit
Network behavioral analysis
Summary
Understanding and Configuring Quality of Service
The need for QoS
Network impact on traffic
Packet loss
Latency
Jitter
QoS models
The integrated services model
The differentiated services model
QoS tools
Traffic conditioning
Policing
Shaping
Markdown
Packet classification
Packet marking
Congestion management
Queuing
Scheduling
Low latency queueing (LLQ)
Class-based weighted fair queueing (CBWFQ)
Congestion avoidance
Tail drop
Random early detection
Weighted random early detection (WRED)
Modular QoS command-line interface
QoS design for an enterprise
Defining the trust boundary
Defining traffic types
Assigning bandwidths
Assessing hardware and assigning classes to queues
Implementing configurations
The ingress policy
The egress policy
QoS in a hybrid model with service provider WAN
Summary
A Systematic Approach to Network Management
Frameworks related to network management
Network management planning
Pillars of network management
People
Processes
Tools and technologies
The importance of metrics
Network operations systems components
Simple Network Management Protocol (SNMP)
SNMP traps
SNMP polling
Syslog
Network Time Protocol (NTP)
Controlling device access using RADIUS
Role-based user access
IP Service Level Assurance (IP-SLA)
Management network
Cisco Prime Infrastructure
Implementing the network management strategy
Summary
Basic Troubleshooting Skills and Techniques
A framework for structured troubleshooting
Establishing the normal and detecting deviations
The network baseline
Application baseline
Network troubleshooting commands
IOS commands
The ping command
The traceroute command
The debug commands
Troubleshooting the network
Troubleshooting user connectivity
Troubleshooting layer 2 issues
Troubleshooting the first hop connectivity
Troubleshooting routing issues
Troubleshooting forwarding plane issues
Troubleshooting performance issues
Troubleshooting the management plane
Troubleshooting device level issues
Hardware issues
Software issues
Summary
更新时间:2021-07-08 10:03:26