|
|
3 | (18) |
|
|
4 | (2) |
|
|
6 | (5) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
Encapsulation/De-encapsulation |
|
|
11 | (3) |
|
Moving Down the OSI Stack |
|
|
11 | (1) |
|
Peer-to-Peer Communication |
|
|
12 | (2) |
|
|
14 | (7) |
|
Layered Communication and Connectivity |
|
|
21 | (18) |
|
Connection-Oriented Models |
|
|
22 | (2) |
|
|
24 | (1) |
|
Flow Control and Windowing |
|
|
25 | (1) |
|
|
26 | (6) |
|
|
27 | (2) |
|
|
29 | (1) |
|
MAC Addresses Versus Logical Addresses |
|
|
29 | (1) |
|
Network Layer Functions and Internetworking |
|
|
29 | (3) |
|
|
32 | (7) |
|
The Cisco IOS---Basic Router Commands |
|
|
39 | (26) |
|
IOS CLI Router---Basic Commands |
|
|
40 | (14) |
|
|
41 | (1) |
|
Entering the Privileged Mode |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
43 | (2) |
|
Command History and Editing Features |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
Examining RAM, NVRAM, and Flash RAM |
|
|
48 | (2) |
|
The Cisco Discovery Protocol |
|
|
50 | (2) |
|
|
52 | (2) |
|
|
54 | (11) |
|
The Cisco IOS---Configuration Commands and Passwords |
|
|
65 | (18) |
|
IOS CLI Router---Configuration |
|
|
66 | (17) |
|
|
68 | (1) |
|
Setting Router Passwords and the Hostnae |
|
|
68 | (2) |
|
|
70 | (2) |
|
Understanding the Router Startup |
|
|
72 | (2) |
|
|
74 | (2) |
|
|
76 | (7) |
|
The Cisco IOS---Configuration Files and IOS Images |
|
|
83 | (16) |
|
IOS CLI Router---Configuration and IOS File Manipulation |
|
|
84 | (15) |
|
The Trivial File Transport Protocol |
|
|
85 | (1) |
|
Copying Configuration Files to the TFTP Server |
|
|
85 | (1) |
|
Copying from the TFTP Server |
|
|
86 | (2) |
|
|
88 | (2) |
|
Manipulating the IOS Software Image |
|
|
90 | (1) |
|
Backing Up the Current IOS Image |
|
|
90 | (1) |
|
Copying an IOS Image from the TFTP Server |
|
|
91 | (8) |
|
Network Protocols---TCP/IP |
|
|
99 | (30) |
|
|
100 | (16) |
|
The Importance of Subnet Masks |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (2) |
|
|
104 | (2) |
|
|
106 | (1) |
|
IP Addresses and Subnetting |
|
|
107 | (2) |
|
Converting Decimal to Binary |
|
|
109 | (1) |
|
|
110 | (1) |
|
Calculating Host Addresses Available |
|
|
111 | (1) |
|
Calculating Subnet Address Ranges |
|
|
112 | (2) |
|
Router Subnet Mask Notation |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (3) |
|
|
116 | (1) |
|
|
117 | (2) |
|
|
119 | (10) |
|
|
119 | (1) |
|
|
120 | (9) |
|
Network Protocols---IPX/SPX |
|
|
129 | (18) |
|
|
130 | (5) |
|
|
132 | (1) |
|
|
133 | (2) |
|
|
135 | (12) |
|
Enabling and Configuring IPX Routing |
|
|
136 | (2) |
|
|
138 | (9) |
|
|
147 | (22) |
|
|
148 | (6) |
|
Static Versus Dynamic Routing |
|
|
149 | (2) |
|
|
151 | (1) |
|
Viewing RIP Routing Tables and Other Parameters |
|
|
151 | (3) |
|
|
154 | (4) |
|
|
155 | (1) |
|
Viewing IGRP Routing Tables and Other Parameters |
|
|
156 | (2) |
|
Router Packet Switching Modes |
|
|
158 | (11) |
|
Distance-Vector Routing Protocols |
|
|
158 | (2) |
|
Link-State Routing Protocols |
|
|
160 | (1) |
|
|
160 | (9) |
|
WAN Protocols---HDLC Frame Relay and ATM |
|
|
169 | (24) |
|
|
170 | (3) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (2) |
|
|
173 | (2) |
|
|
175 | (6) |
|
|
177 | (1) |
|
Frame Relay Encapsulation and DLCIs |
|
|
177 | (1) |
|
Mapping Network Protocol Addresses |
|
|
178 | (1) |
|
Configuring Subinterfaces |
|
|
179 | (1) |
|
|
179 | (2) |
|
|
181 | (12) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (10) |
|
WAN Protocols---Configuring PPP and ISDN |
|
|
193 | (16) |
|
|
194 | (3) |
|
|
194 | (1) |
|
|
195 | (2) |
|
|
197 | (12) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
Cisco's Implementation of ISDN BRI |
|
|
201 | (8) |
|
Access Lists and Network Troubleshooting |
|
|
209 | (30) |
|
|
210 | (13) |
|
|
211 | (1) |
|
Complex IP Wildcard Masks |
|
|
212 | (1) |
|
Configuring and Grouping Standard IP Access Lists |
|
|
213 | (1) |
|
|
214 | (1) |
|
Configuring Extended IP Access Lists |
|
|
215 | (2) |
|
Monitoring IP Access Lists |
|
|
217 | (1) |
|
IPX Access Lists and SAP Filters |
|
|
218 | (1) |
|
IPX Standard Access Lists |
|
|
219 | (1) |
|
IPX Extended Access Lists |
|
|
220 | (1) |
|
|
220 | (3) |
|
|
223 | (16) |
|
The show interfaces ethernet Command |
|
|
223 | (2) |
|
The show interfaces tokenring Command |
|
|
225 | (2) |
|
The show interface serial Command |
|
|
227 | (1) |
|
Checking Network Connections |
|
|
228 | (11) |
|
LAN Design and Segmentation |
|
|
239 | (28) |
|
|
240 | (2) |
|
|
242 | (2) |
|
|
244 | (2) |
|
|
246 | (2) |
|
Network Segmentation and VLANs |
|
|
248 | (6) |
|
|
248 | (2) |
|
|
250 | (2) |
|
|
252 | (2) |
|
The Spanning-Tree Protocol |
|
|
254 | (1) |
|
|
255 | (2) |
|
|
257 | (10) |
Appendix A The Student Preparation Guide |
|
267 | (6) |
|
The CCNA Exam and This Book |
|
|
267 | (2) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
Index |
|
273 | |