Introduction to WANs | p. 1 |
Objectives | p. 1 |
Key Terms | p. 1 |
Introducing Wide-Area Networks (WANs) | p. 3 |
What Is a WAN? | p. 3 |
Why Are WANs Necessary? | p. 5 |
The Evolving Enterprise | p. 5 |
Businesses and Their Networks | p. 5 |
Small Office (Single LAN) | p. 6 |
Campus (Multiple LANs) | p. 6 |
Branch (WAN) | p. 8 |
Distributed (Global) | p. 9 |
The Evolving Network Model | p. 11 |
The Hierarchical Design Model | p. 11 |
The Enterprise Architecture | p. 13 |
WAN Technology Concepts | p. 17 |
WAN Technology Overview | p. 17 |
WAN Physical Layer Concepts | p. 18 |
WAN Data Link Layer Concepts | p. 23 |
WAN Switching Concepts | p. 26 |
WAN Connection Options | p. 29 |
WAN Link Connection Options | p. 29 |
Dedicated Connection Link Options | p. 31 |
Circuit-Switched Connection Options | p. 32 |
Packet-Switched Connection Options | p. 35 |
I nternet Connection Options | p. 38 |
Choosing a WAN Link Connection | p. 44 |
Summary | p. 48 |
Labs | p. 49 |
Check Your Understanding | p. 50 |
Challenge Questions and Activities | p. 54 |
PPP | p. 55 |
Objectives | p. 55 |
Key Terms | p. 55 |
Introducing Serial Communications | p. 56 |
How Does Serial Communication Work? | p. 56 |
Serial Communication Standards | p. 59 |
TDM | p. 61 |
Demarcation Point | p. 66 |
Data Terminal Equipment and Data Communications Equipment | p. 67 |
HDLC Encapsulation | p. 72 |
Configuring HDLC Encapsulation | p. 75 |
Troubleshooting Serial Interfaces | p. 76 |
PPP Concepts | p. 83 |
Introducing PPP | p. 83 |
PPP Layered Architecture | p. 84 |
PPP Frame Structure | p. 87 |
Establishing a PPP Session | p. 88 |
Establishing a Link with LCP | p. 89 |
NCP Explained | p. 95 |
PPP Configuration Options | p. 97 |
PPP Configuration Commands | p. 98 |
Verifying a Serial PPP Encapsulation Configuration | p. 101 |
Troubleshooting PPP Encapsulation | p. 102 |
PPP Authentication Protocols | p. 108 |
Password Authentication Protocol | p. 109 |
Challenge Handshake Authentication Protocol (CHAP) | p. 110 |
PPP Encapsulation and Authentication Process | p. 112 |
Configuring PPP with Authentication | p. 115 |
Troubleshooting a PPP Configuration with Authentication | p. 118 |
Summary | p. 120 |
Labs | p. 120 |
Check Your Understanding | p. 122 |
Challenge Questions and Activities | p. 126 |
Frame Relay | p. 127 |
Objectives | p. 127 |
Key Terms | p. 127 |
Introduction | p. 128 |
Basic Frame Relay Concepts | p. 128 |
Introducing Frame Relay | p. 128 |
Virtual Circuits | p. 134 |
Frame Relay Encapsulation | p. 140 |
Frame Relay Topologies | p. 141 |
Frame Relay Address Mapping | p. 145 |
Configuring Frame Relay | p. 152 |
Enabling Frame Relay Encapsulation | p. 153 |
Configuring Static Frame Relay Maps | p. 156 |
Advanced Frame Relay Concepts | p. 159 |
Solving Reachability Issues | p. 159 |
Frame Relay Subinterfaces | p. 161 |
Paying for Frame Relay | p. 162 |
Frame Relay Flow Control | p. 166 |
Configuring Advanced Frame Relay | p. 168 |
Configuring Frame Relay Subinterfaces | p. 168 |
Verifying Frame Relay Operation | p. 171 |
Troubleshooting Frame Relay Configuration | p. 178 |
Summary | p. 180 |
Labs 181 | |
Check Your Understanding | p. 182 |
Challenge Questions and Activities | p. 188 |
To Learn More | p. 188 |
Network Security | p. 189 |
Objectives | p. 189 |
Key Terms | p. 189 |
Introduction to Network Security | p. 190 |
Why Is Network Security Important? | p. 190 |
Common Security Threats | p. 199 |
Types of Network Attacks | p. 206 |
General Mitigation Techniques | p. 219 |
The Network Security Wheel | p. 226 |
The Enterprise Security Policy | p. 229 |
Securing Cisco Routers | p. 232 |
Router Security Issues | p. 232 |
Applying Cisco IOS Security Features to Routers | p. 235 |
Securing Router Network Services | p. 250 |
Vulnerable Router Services and Interfaces | p. 250 |
Securing Routing Protocols | p. 256 |
Lockin | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.