CCIE® Practical Studies, Volume I by Karl Solie Publisher: Cisco Press

CCIE® Practical Studies, Volume I by Karl Solie Publisher: Cisco Press

" Table of Contents " Index CCIE® Practical Studies, Volume I By Karl Solie Publisher: Cisco Press Pub Date: December 01, 2001 ISBN: 1−58720−002−3 Pages: 1366 Slots: 2 Cisco Certified Internetwork Expert (CCIE) certification is the most difficult and most rewarding of the Cisco(r) certifications. Although the professional and financial benefits of a CCIE are excellent, attaining this level of certification takes years of experience, study, and effort. Serving a dual role of networking reference guide for configuring Cisco routers and preparation tool for the CCIE Lab Exams, CCIE Practical Studies, Volume I, is an ideal resource to help you achieve and earn the coveted CCIE designation. CCIE Practical Studies, Volume I, provides you with the knowledge to assemble and configure all the necessary hardware and software components required to model complex, Cisco−driven internetworks based on the OSI reference model−from Layer 1 on up. Each chapter focuses on one or more specific technologies or protocols and follows up with a battery of CCIE exam−like labs for you to configure that challenges your understanding of the chapter topics and measures your aptitude as a CCIE candidate. The final chapter of the book provides five CCIE "Simulation Labs." These labs not only test your knowledge but your speed as well−a crucial aspect of the new one−day format of the CCIE exam. Among the many resources you will need to study for the CCIE exam, you will find CCIE Practical Studies, Volume I, to be an indispensable preparation tool. " Table of Contents " Index CCIE® Practical Studies, Volume I By Karl Solie Publisher: Cisco Press Pub Date: December 01, 2001 ISBN: 1−58720−002−3 Pages: 1366 Slots: 2 Copyright About the Authors Contributing Authors Acknowledgments Foreword Introduction Goals Who Should Read This Book? How This Book Is Organized Icons Used in This Book Command Syntax Conventions Part I: Modeling the Internetwork Chapter 1. The Key Components for Modeling an Internetwork Identifying the Key Components Needed for Modeling Internetworks The Access Server Modeling Local−Area Networks (LANs) Simulating Wide−Area Network Connections Routers, Cisco IOS Software, and Memory Requirements for Labs Test Hosts and Data Simulation Building the Framework for Internetwork Modeling—Configuring Key Components Practical Study for Chapter 1: Setting Up Lab 1: Password Recovery—Part I Lab 1: Password Recovery—Part II Lab 2: Password Recovery on a Catalyst 5500—Part I Lab 2: Password Recovery on a Catalyst 5500—Part II Lab 3: Upgrading the IOS and Restoring a Configuration from TFTP Server—Part I Lab 3: Upgrading the IOS and Restoring a Configuration from a TFTP Server—Part II Lab 4: Configuring an Access Server—Part I Lab 4: Configuring an Access Server—Part II Lab 5: Configuring a Frame Relay Switch—Part I Lab 5: Configuring a Frame Relay Switch—Part II Lab 6: Configuring Remote Access to the Lab—Part I Lab 6: Configuring Remote Access to the Lab—Part II Part II: Modeling LANs Chapter 2. LAN Protocols: Configuring Catalyst Ethernet and Token Ring Switches Ethernet LANs Ethernet: A Brief History of an Evolutionary Protocol Ethernet Technical Overview 802.1d Spanning−Tree Protocol (STP) Ethernet Switching IEEE 802.5/Token Ring LANs Token Ring: 30 Years Old and Still in Service Token Ring Technical Overview Token Ring Switching Token Ring Bridge Relay Function (TrBRF) and the Token Ring Concentrator Function (TrCRF) Configuring Token Ring Switching on the Catalyst 3920 More Practice: Ethernet/Token Ring Labs Lab 7: Ethernet Switching, VLAN Trunking, and Spanning Tree Root Placement—Part I Lab 7: Ethernet Switching, VLAN Trunking, and Spanning Tree Root Placement—Part II Lab 8: Configuring Token Ring Switching Using the Catalyst 3920—Part I Lab 8: Configuring Token Ring Switching Using the Catalyst 3920—Part II Part III: Connecting LANs with Wide−Area Networks (WANs) Chapter 3. WAN Protocols and Technologies: High−Level Data Link Control (HDLC) The Compatibility and Simplicity of HDLC Lab 9: Configuring HDLC—Part I Lab 9: Configuring HDLC—Part II Chapter 4. WAN Protocols and Technologies: Point−to−Point Protocol (PPP) The Many Uses of PPP Lab 10: Configuring PPP, PAP, and Compression over Asynchronous Dialup—Part I Lab 10: Configuring PPP, PAP, and Compression over Asynchronous Dialup—Part II Lab 11: Configuring PPP, CHAP, and LQM over Synchronous Links—Part I Lab 11: Configuring PPP, CHAP, and LQM over Synchronous Links—Part II Lab 12: Configuring PPP Analog Backup for Synchronous Links—Part I Lab 12: Configuring PPP Analog Backup for Synchronous Links—Part II Chapter 5. WAN Protocols and Technologies: Frame Relay Frame Relay Terminology Frame Relay Technical Overview Configuring Frame Relay The "Big show" and "Big D" for Frame Relay Additional Commands for Configuring Frame Relay Configuring Frame Relay Traffic Shaping Lab 13: Configuring Frame Relay Networks and Controlling Frame Relay ARP—Part I Lab 13: Configuring Frame Relay Networks and Controlling Frame Relay ARP—Part II Lab 14: Configuring Frame Relay Networks, Traffic Shaping, OSPF, & DLSw/LLC2—Part I Lab 14: Configuring Frame Relay Networks, Traffic Shaping, OSPF, & DLSw/LLC2—Part II Chapter 6. WAN Protocols and Technologies: Voice over X Introduction to Analog Telephony Digital Voice Technology Cisco Voice Products Lab 15: Configuring Voice over Frame, Voice over IP, and Voice over ATM Lab 15a: Configuring Voice over Frame Relay—Part I Lab 15a: Configuring Voice over Frame Relay—Part II Lab 15b: Configuring Voice over IP—Part I Lab 15b: Configuring Voice over IP—Part II Lab 15c: Configuring Voice over ATM—Part I Lab 15c: Configuring Voice over ATM—Part II Lab 15d: Optional Private Line Automatic Ring Down (PLAR) Connection Chapter 7. WAN Protocols and Technologies: Integrated Services Digital Network (ISDN) ISDN Development, Components, and Mechanics ISDN Configuration Basics Configuring Dial−on−Demand Routing (DDR) The "Big show" and "Big D" for Troubleshooting ISDN Useful Tips and Tricks ISDN Labs Lab 16: Configuring PPP Authentication, Callback, and Multilink over ISDN Lab 17: Configuring OSPF Demand Circuits over ISDN Summary Chapter 8. WAN Protocols and Technologies: Asynchronous Transfer Mode (ATM) Special Components Needed for ATM Lab Studies Configuring RFC 2684 Configuring RFC 2225 (Classical IP) Lab 18: Configuring PVCs on Cisco 7XXX Routers, RFC 2684—Part I Lab 18: Configuring PVCs on Cisco 7XXX Routers, RFC 2684—Part II Lab 19: Configuring Classical IP Using SVCs on Cisco 7XXX Routers, RFC 2225—Part I Lab 19: Configuring Classical IP Using SVCs on Cisco 7XXX Routers, RFC 2225—Part II Summary Part IV: Routing Protocols Chapter 9. Distance Vector Protocols: Routing Information Protocol Versions 1 and 2 (RIP−1 and RIP−2) Technical Overview of RIP Configuring RIP−1 and RIP−2 Tuning, Redistribution, and Control of RIP Updates RIP Default Routing Lab 20: Integrating RIP Networks: Redistribution, Route Filtering, and Control—Part I Lab 20: Integrating RIP Networks: Redistribution, Route Filtering, and Control—Part II Chapter 10. Distance Vector Protocols: Interior Gateway Routing Protocol (IGRP) Technical Overview of IGRP Configuring IGRP Tuning, Redistribution, and Controlling IGRP Updates Lab 21: Default Routing, Filtering, and Unequal−Cost Load Sharing in IGRP Networks—Part I Lab 21: Default Routing, Filtering, and Unequal−Cost Load Sharing in IGRP Networks—Part II Chapter 11. Hybrid: Enhanced Interior Gateway Routing Protocol (EIGRP) Technical Overview of EIGRP Split Horizon Configuring EIGRP The "Big show" and "Big D" for EIGRP Tuning EIGRP Updates EIGRP Redistribution and Route Control EIGRP Summarization Default Routing with EIGRP EIGRP Stub Routing EIGRP Equal− and Unequal−Cost Load Balancing Lab 22: EIGRP Route Redistribution, Summarization, and Stub Routing—Part I Lab 22: EIGRP Route Redistribution, Summarization, and Stub Routing—Part II Lab 23: Default Routing, Route manipulation, and Filtering in EIGRP Networks—Part I Lab 23: Default Routing, Route Manipulation, and Filtering in EIGRP Networks—Part II Chapter 12. Link−State Protocols: Open Shortest Path First (OSPF) Technical Overview of OSPF Configuring OSPF The "Big show" and "Big D" for OSPF Configuring OSPF Stub Areas Tuning OSPF OSPF Flooding Reduction OSPF Redistribution and Route Control OSPF Summarization OSPF Default Routing OSPF Authentication OSPF Demand Circuits and Backup OSPF Virtual Links Lab 24: OSPF Multiple Area Routing, Authentication, Path Manipulation, Default Routing—Part I Lab 24: OSPF Multiple Area Routing, Authentication, Path Manipulation, Default Routing—Part II Lab 25: OSPF Multiple Area Routing, Route Redistribution and Summarization—Part I Lab 25: OSPF Multiple Area Routing, Route Redistribution and Summarization—Part II Part V: Transporting Non−Routable Protocols Chapter 13. Configuring Bridging and Data Link Switching Plus Transparent Bridging Integrated Routing and Bridging Source Route Bridging (SRB) Data Link Switching Plus (DLSw+) Filtering Traffic in Bridged Environments Lab 26: Transparent Bridging, Remote Source−Route Bridging, LSAP Filtering—Part I Lab 26: Transparent Bridging, Remote Source−Route Bridging, LSAP Filtering—Part II Lab 27: DLSw+ TCP, LLC2, Promiscuous, Dynamic, and Backup Peer Configuration—Part I Lab 27: DLSw+ TCP, LLC2, Promiscuous, Dynamic, and Backup Peer Configuration—Part II Lab 28: DLSw+ Reachability, Border Peers, Demand Peers, and Resilient Peers—Part I Lab 28: DLSw+ Reachability, Border Peers, Demand Peers, and Resilient Peers—Part II Part VI: Controlling Networks and Network Access Chapter 14. Understanding IP Access Lists Understanding How Access Lists Operate Access Lists, Wildcard Masks, and Binary Math Standard IP Access Lists Extended IP Access Lists Displaying Access Lists Dynamic Access Lists Named Access Lists Lab 29: Configuring Access Lists, Named Access Lists, and EIGRP Route Filters—Part I Lab 29: Configuring Access Lists, Named Access Lists, and EIGRP Route Filters—Part II Lab 30: Configuring Dynamic Access Lists and Traffic Filters by Using Named Access Lists—Part I Lab 30: Configuring Dynamic Access Lists and Traffic Filters by Using Named Access Lists—Part II Part VII: Enhanced Network Protocols Chapter 15.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    896 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us