CCNA 200-301 Portable Command Guide, 5th Edition

Book description

CCNA 200-301 Portable Command Guide is filled with valuable, easy-to-access information–and it's portable enough to use whether you're in the server room or the equipment closet.

 

 

The guide summarizes all CCNA certification-level Cisco IOS Software commands, keywords, command arguments, and associated prompts, providing you with tips and examples of how to apply the commands to real-world scenarios. Throughout, configuration examples give you a better understanding of how these commands are used in simple network designs.

 

 

This book has been completely updated to cover topics in the new 200-301 exam. Use this quick reference resource to help you memorize commands and concepts as you work to pass the CCNA certification exam. Coverage includes

 

· Network Fundamentals: IPv4 addressing, subnetting, VLSM, route summarization, IPv6 addressing, cables/connections, CLI

· LAN Switching Technologies: Switch configuration, VLANs, VLAN trunking protocol, inter-VLAN communication, STP, EtherChannel, CDP, LLDP

· Routing Technologies: Router configuration, static routing, OSPF

· IP Services: DHCP, NAT, NTP

· Security Fundamentals: Layer 2 security, ACL traffic management, device monitoring and hardening

· Wireless Technologies: Configuring and securing a WLAN AP

 

· Quick, offline access to all CCNA commands for research and solutions

· Logical how-to topic groupings for a one-stop resource

· Great for review before CCNA certification exams

· Compact size makes it easy to carry with you wherever you go

· “Create Your Own Journal” section with blank, lined pages enables you to personalize the book for your needs

 

This book is part of the Cisco Press Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press.

Table of contents

  1. Cover Page
  2. About This E-Book
  3. Title Page
  4. Copyright Page
  5. Contents at a Glance
  6. Contents
  7. About the Author
  8. About the Technical Reviewer
  9. Dedication
  10. Acknowledgments
  11. Reader Services
  12. Command Syntax Conventions
  13. Introduction
    1. Private Addressing Used in This Book
    2. Who Should Read This Book
    3. Optional Sections
    4. Organization of This Book
    5. Did I Miss Anything?
  14. Part I: Network Fundamentals
    1. Chapter 1. IPv4 Addressing—How It Works
      1. What Are IPv4 Addresses Used For?
      2. What Does an IPv4 Address Look Like?
      3. Network and Subnetwork Masks
      4. Ways to Write a Network or Subnet Mask
      5. Network, Node, and Broadcast Addresses
      6. Classes of IPv4 Addresses
      7. Classless Addressing
      8. Lessons Learned
    2. Chapter 2. How to Subnet IPv4 Addresses
      1. Subnetting a Class C Network Using Binary
      2. Subnetting a Class B Network Using Binary
      3. Binary ANDing
    3. Chapter 3. Variable Length Subnet Masking (VLSM)
      1. IP Subnet Zero
      2. VLSM Example
    4. Chapter 4. Route Summarization
      1. Example for Understanding Route Summarization
      2. Route Summarization and Route Flapping
      3. Requirements for Route Summarization
    5. Chapter 5. IPv6 Addressing—How It Works
      1. IPv6: A Very Brief Introduction
      2. What Does an IPv6 Address Look Like?
      3. Reducing the Notation of an IPv6 Address
      4. Prefix Length Notation
      5. IPv6 Address Types
    6. Chapter 6. Cables and Connections
      1. Connecting a Rollover Cable to Your Router or Switch
      2. Using a USB Cable to Connect to Your Router or Switch
      3. Terminal Settings
      4. LAN Connections
      5. Serial Cable Types
      6. Which Cable to Use?
      7. ANSI/TIA Cabling Standards
    7. Chapter 7. The Command-Line Interface
      1. Shortcuts for Entering Commands
      2. Using the Key to Complete Commands
      3. Console Error Messages
      4. Using the Question Mark for Help
      5. enable Command
      6. exit Command
      7. end Command
      8. disable Command
      9. logout Command
      10. Setup Mode
      11. Keyboard Help
      12. History Commands
      13. terminal Commands
      14. show Commands
      15. Using the Pipe Parameter ( | ) with the show or more Commands
      16. Using the no and default Forms of Commands
  15. Part II: LAN Switching Technologies
    1. Chapter 8. Configuring a Switch
      1. Help Commands
      2. Command Modes
      3. Verifying Commands
      4. Resetting Switch Configuration
      5. Setting Host Names
      6. Setting Passwords
      7. Setting IP Addresses and Default Gateways
      8. Setting Interface Descriptions
      9. The mdix auto Command
      10. Setting Duplex Operation
      11. Setting Operation Speed
      12. Managing the MAC Address Table
      13. Configuration Example
    2. Chapter 9. VLANs
      1. Creating Static VLANs
      2. Assigning Ports to VLANs
      3. Using the range Command
      4. Configuring a Voice VLAN
      5. Verifying VLAN Information
      6. Saving VLAN Configurations
      7. Erasing VLAN Configurations
      8. Configuration Example: VLANs
    3. Chapter 10. VLAN Trunking Protocol and Inter-VLAN Communication
      1. Dynamic Trunking Protocol (DTP)
      2. Setting the VLAN Encapsulation Type
      3. VLAN Trunking Protocol (VTP)
      4. Verifying VTP
      5. Inter-VLAN Communication Using an External Router: Router-on-a-Stick
      6. Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface
      7. Inter-VLAN Communication Tips
      8. Configuration Example: Inter-VLAN Communication
    4. Chapter 11. Spanning Tree Protocol
      1. Spanning Tree Protocol Definition
      2. Enabling Spanning Tree Protocol
      3. Changing the Spanning-Tree Mode
      4. Configuring the Root Switch
      5. Configuring a Secondary Root Switch
      6. Configuring Port Priority
      7. Configuring the Path Cost
      8. Configuring the Switch Priority of a VLAN
      9. Configuring STP Timers
      10. Configuring Optional Spanning-Tree Features
      11. Enabling the Extended System ID
      12. Verifying STP
      13. Troubleshooting Spanning Tree Protocol
      14. Configuration Example: PVST+
      15. Spanning-Tree Migration Example: PVST+ to Rapid-PVST+
    5. Chapter 12. EtherChannel
      1. EtherChannel
      2. Configuration Example: EtherChannel
    6. Chapter 13. Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP)
      1. Cisco Discovery Protocol
      2. Configuring CDP
      3. Verifying and Troubleshooting CDP
      4. CDP Design Tips
      5. Link Layer Discovery Protocol (802.1AB)
      6. Configuring LLDP (802.1AB)
      7. Verifying and Troubleshooting LLDP
  16. Part III: Routing Technologies
    1. Chapter 14. Configuring a Cisco Router
      1. Router Modes
      2. Entering Global Configuration Mode
      3. Configuring a Router Name
      4. Configuring Passwords
      5. Password Encryption
      6. Interface Names
      7. Moving Between Interfaces
      8. Configuring a Serial Interface
      9. Assigning an IPv4 Address to a Fast Ethernet Interface
      10. Assigning an IPv4 Address to a Gigabit Ethernet Interface
      11. Assigning IPv6 Addresses to Interfaces
      12. Creating a Message-of-the-Day Banner
      13. Creating a Login Banner
      14. Mapping a Local Host Name to a Remote IP Address
      15. The no ip domain-lookup Command
      16. The logging synchronous Command
      17. The exec-timeout Command
      18. Saving Configurations
      19. Erasing Configurations
      20. The write Command
      21. Verifying Your Configurations Using show Commands
      22. EXEC Commands in Configuration Mode: The do Command
      23. Configuration Example: Basic Router Configuration
    2. Chapter 15. Static Routing
      1. Configuring an IPv4 Static Route
      2. Static Routes and Recursive Lookups
      3. The permanent Keyword
      4. Floating Static Routes in IPv4 and Administrative Distance
      5. Configuring an IPv4 Default Route
      6. Verifying IPv4 Static Routes
      7. Configuration Example: IPv4 Static Routes
      8. Configuring an IPv6 Static Route
      9. Floating Static Routes in IPv6
      10. Configuring an IPv6 Default Route
      11. Verifying IPv6 Static Routes
    3. Chapter 16. Open Shortest Path First (OSPF)
      1. OSPFv2 Versus OSPFv3
      2. Configuring OSPF
      3. Using Wildcard Masks with OSPF Areas
      4. Loopback Interfaces
      5. Router ID
      6. DR/BDR Elections
      7. Timers
      8. Verifying OSPFv2 Configurations
      9. Troubleshooting OSPFv2
      10. Configuration Example: Single-Area OSPF
  17. Part IV: IP Services
    1. Chapter 17. DHCP
      1. Configuring a DHCP Server on an IOS Router
      2. Using Cisco IP Phones with a DHCP Server
      3. Verifying and Troubleshooting DHCP Configuration
      4. Configuring a DHCP Helper Address
      5. Configuring a DHCP Client on a Cisco IOS Software Ethernet Interface
      6. Configuration Example: DHCP
    2. Chapter 18. Network Address Translation (NAT)
      1. Private IP Addresses: RFC 1918
      2. Configuring Dynamic NAT: One Private to One Public Address Translation
      3. Configuring PAT: Many Private to One Public Address Translation
      4. Configuring Static NAT: One Private to One Permanent Public Address Translation
      5. Verifying NAT and PAT Configurations
      6. Troubleshooting NAT and PAT Configurations
      7. Configuration Example: PAT
    3. Chapter 19. Configuring Network Time Protocol (NTP)
      1. NTP Configuration
      2. NTP Design
      3. Securing NTP
      4. Verifying and Troubleshooting NTP
      5. Setting the Clock on a Router
      6. Using Time Stamps
      7. Configuration Example: NTP
  18. Part V: Security Fundamentals
    1. Chapter 20. Layer Two Security Features
      1. Setting Passwords on a Switch
      2. Configuring Static MAC Addresses
      3. Configuring Switch Port Security
      4. Configuring Sticky MAC Addresses
      5. Verifying Switch Port Security
      6. Recovering Automatically from Error-Disabled Ports
      7. Verifying Autorecovery of Error-Disabled Ports
      8. Configuring DHCP Snooping
      9. Configuring Dynamic ARP Inspection (DAI)
      10. Configuration Example: Switch Security
    2. Chapter 21. Managing Traffic Using Access Control Lists (ACLs)
      1. Access List Numbers
      2. Using Wildcard Masks
      3. ACL Keywords
      4. Creating Standard ACLs
      5. Applying Standard ACLs to an Interface
      6. Verifying ACLs
      7. Removing ACLs
      8. Creating Extended ACLs
      9. Applying Extended ACLs to an Interface
      10. The established Keyword
      11. The log Keyword
      12. Creating Named ACLs
      13. Using Sequence Numbers in Named ACLs
      14. Removing Specific Lines in Named ACLs Using Sequence Numbers
      15. Sequence Number Tips
      16. Including Comments About Entries in ACLs
      17. Restricting Virtual Terminal Access
      18. Tips for Configuring ACLs
      19. IPv6 ACLs
      20. Verifying IPv6 ACLs
      21. Configuration Examples: IPv4 ACLs
      22. Configuration Examples: IPv6 ACLs
    3. Chapter 22. Device Monitoring and Hardening
      1. Device Monitoring
      2. Configuration Backups
      3. Implementing Logging
      4. Device Hardening
  19. Part VI: Wireless Technologies
    1. Chapter 23. Configuring and Securing a WLAN AP
      1. Initial Setup of a Wireless LAN Controller (WLC)
      2. Monitoring the WLC
      3. Configuring a VLAN (Dynamic) Interface
      4. Configuring a DHCP Scope
      5. Configuring a WLAN
      6. Defining a RADIUS Server
      7. Exploring Management Options
      8. Configuring a WLAN Using WPA2 PSK
  20. Part VII: Appendices
    1. Appendix A. How to Count in Decimal, Binary, and Hexadecimal
      1. How to Count in Decimal
      2. How to Count in Binary
      3. How to Count in Hexadecimal
      4. Representing Decimal, Binary, and Hexadecimal Numbers
    2. Appendix B. How to Convert Between Number Systems
      1. How to Convert from Decimal to Binary
      2. How to Convert from Binary to Decimal
      3. How to Convert from Decimal IP Addresses to Binary and from Binary IP Addresses to Decimal
      4. How to Convert from Hexadecimal to Binary
      5. How to Convert from Binary to Hexadecimal
      6. How to Convert from Decimal to Hexadecimal
      7. How to Convert from Hexadecimal to Decimal
    3. Appendix C. Binary/Hex/Decimal Conversion Chart
    4. Appendix D. Create Your Own Journal Here
  21. Index
  22. Code Snippets

Product information

  • Title: CCNA 200-301 Portable Command Guide, 5th Edition
  • Author(s): Scott D. Empson
  • Release date: December 2019
  • Publisher(s): Cisco Press
  • ISBN: 9780135937907