Table of Contents
Cisco Network Administration in a Month of Lunches Table of Contents
Return to Cisco Network Administration in a Month of Lunches by Ben Piper, CCNA
About this Book
About the Author
Chapter 1. Before you begin
Chapter 2. What is a Cisco network?
Chapter 3. A crash course on Cisco's Internetwork Operating System
Chapter 4. Managing switch ports
Chapter 5. Securing ports by using the Port Security feature
Chapter 6. Managing virtual LANs (VLANs)
Chapter 7. Breaking the VLAN barrier by using switched virtual interfaces
Chapter 8. IP address assignment by using Dynamic Host Configuration Protocol
Chapter 9. Securing the network by using IP access control lists
Chapter 10. Connecting switches using trunk links
Chapter 11. Automatically configuring VLANs using the VLAN Trunking Protocol
Chapter 12. Protecting against bridging loops by using the Spanning Tree Protocol
Chapter 13. Optimizing network performance by using port channels
Chapter 14. Making the network scalable by connecting routers and switches together
Chapter 15. Manually directing traffic using the IP routing table
Chapter 16. A dynamic routing protocols crash course
Chapter 17. Tracking down devices
Chapter 18. Securing Cisco devices
Chapter 19. Facilitating troubleshooting using logging and debuging
Chapter 20. Recovering from disaster
[Chapter]] 21. Performance and health checklist
[List]] of Tables
About this Book
About the Author
Chapter 1. Before you begin
1.1. Is this book for you?
1.2. How to use this book
1.2.3. Further exploration
1.2.4. Above and beyond
1.3. Lab considerations
1.3.1. Choosing your lab environment
1.3.2. Virtual lab considerations
1.3.3. Practicing on a live, production network
1.3.4. My recommendation for your lab environment
1.3.5. Cisco Internetwork Operating System versions
1.4. Online resources
1.5. A word on my recommendations
1.6. Being an immediately effective network administrator
Chapter 2. What is a Cisco network?
2.1. The truth about routers and switches
2.2. MAC addresses
2.3. The Ethernet frame: a big envelope
2.3.1. When everybody talks, nobody listens
2.4. Broadcast domains
2.4.1. Closing the floodgates: the MAC address table
2.4.2. Breaking up the broadcast domain
2.4.3. Joining broadcast domains
2.4.4. Addressing devices across broadcast domains
2.5. Internet Protocol addresses
2.5.1. Where are you?
2.5.3. Address Resolution Protocol
2.6. Connecting broadcast domains using a router
2.6.1. Where are you? Where am I?
2.6.2. Understanding subnets
2.7. Traversing broadcast domains using a default gateway
2.8. Managing routers and switches
Chapter 3. A crash course on Cisco's Internetwork Operating System
3.1. What is IOS?
3.2. Logging into Cisco devices
3.3. The show command
3.4. Identifying the IOS version and package
3.4.1. Version numbers
3.4.2. Packages
3.5. Viewing the running configuration
3.6. Changing the running configuration
3.7. Saving the startup configuration
3.8. The no command
Chapter 4. Managing switch ports
4.2.1. The interface range command
4.3.1. Finding unused interfaces
4.4. Changing the port speed and duplex
4.4.1. Speed
4.4.2. Duplex
4.4.3. Autonegotiation
4.4.4. Changing the port speed
Chapter 5. Securing ports by using the Port Security feature
5.1. The minimum Port Security configuration
5.1.1. Preventing MAC flood attacks
5.2. Testing Port Security
5.3.1. Port Security never forgets!
5.4. Preventing unauthorized devices
5.4.1. Making Port Security maximally secure
5.4.2. Sticky MAC addresses
5.4.3. Caveats about sticky MACs
Chapter 6. Managing virtual LANs (VLANs)
6.1. What is a VLAN?
6.2.1. The VLAN database
6.2.2. The default VLAN
6.2.3. How many VLANs should you create?
6.4.1. Checking port configuration
6.4.2. Setting the access VLAN
6.4.3. Setting the access mode
Chapter 7. Breaking the VLAN barrier by using switched virtual interfaces
7.1. Understanding the VLAN–subnet connection
7.2.1. Enabling IP routing
7.3. What are switched virtual interfaces?
7.3.1. Creating and configuring SVIs
7.4. Default gateways
7.4.1. Testing inter-VLAN connectivity
Chapter 8. IP address assignment by using Dynamic Host Configuration Protocol
8.1. To switch or not to switch?
8.2. Configuring a Cisco DHCP server
8.2.1. Scopes
8.2.2. Options
8.2.3. Lease time
8.3. Configuring a DHCP pool
8.4. Excluding addresses from assignment
8.5. Configuring devices to request DHCP addresses
8.6. Associating DHCP Pools with VLANs
8.7. Creating a second DHCP pool
8.8. Viewing DHCP leases
8.9. Using non-Cisco DHCP servers
8.9.1. Asking the switch for help using the ip helper-address command
8.10. Commands in this chapter
Chapter 9. Securing the network by using IP access control lists
9.1. Blocking IP-to-IP traffic
9.1.1. Creating an access list
9.2. Applying an ACL to an interface
9.3. Blocking IP-to-subnet traffic
9.3.3. Applying an access control list to a switched virtual interface
9.4. Blocking subnet-to-subnet traffic
Chapter 10. Connecting switches using trunk links
10.1. Connecting the new switch
10.2. Understanding VLAN trunk links
10.2.1. Configuring a trunk link
10.2.2. Configuring DTP to automatically negotiate a trunk
10.3. Configuring Switch2
10.3.1. Configuring VLANs on the new switch
10.4. Moving devices to the new switch
10.5. Changing the trunk encapsulation
10.6. Commands in this chapter
Chapter 11. Automatically configuring VLANs using the VLAN Trunking Protocol
11.2. Configuring Switch1 as a VTP server
11.3. Configuring Switch2 as a VTP client
11.4. Creating new VLANs on Switch1
11.6. Commands in this chapter
Chapter 12. Protecting against bridging loops by using the Spanning Tree Protocol
12.1.1. How Spanning Tree deals with link failures
12.4. Commands in this chapter
Chapter 13. Optimizing network performance by using port channels
13.1.1. Static
13.1.2. Dynamic
13.2. Configuring a dynamic port channel using the Link Aggregation Control Protocol
13.3. Creating a static port channel
13.5. Commands in this chapter
Chapter 14. Making the network scalable by connecting routers and switches together
14.1. The router-on-a-stick configuration
14.2. Connecting Router1
14.3. Configuring subinterfaces
14.4. The IP routing table
14.5. Applying an ACL to a subinterface
14.6. Commands in this chapter
Chapter 15. Manually directing traffic using the IP routing table
15.1. Connecting Router1 to Switch2
15.2. Configuring transit subnets
15.2.1. Assigning transit IP addresses directly to physical interfaces
15.2.2. Assigning transit IP addresses to subinterfaces and SVIs
15.3. Removing the trunk link between switches
15.4. Configuring default gateways
15.5. Creating a DHCP pool for the Executives subnet
15.6. Commands in this chapter
Chapter 16. A dynamic routing protocols crash course
16.1. Understanding router IDs
16.1.1. Configuring loopback interfaces
16.2. Configuring EIGRP
16.2.1. Choosing the best path
16.2.2. Routing around failures
16.2.3. EIGRP recap
16.3. Open Shortest Path First
16.4. Commands used in this chapter
Chapter 17. Tracking down devices
17.1. Device-tracking scenarios
17.2. Steps to tracking down a device
17.2.1. Get the IP address
17.2.2. Trace the device to the last hop
17.2.3. Get the MAC address
17.3. Example 1 — Tracking down a network printer
17.3.1. Tracing to the last hop using traceroute
17.3.2. Cisco Discovery Protocol
17.3.3. Obtaining the MAC address of the device
17.3.4. Viewing the MAC address table
17.4. Example 2 — Tracking down a server
17.4.1. Tracing to the last hop using traceroute
17.4.2. Obtaining the MAC address of the device
17.4.3. Viewing the MAC address table
17.5. Commands used in this chapter
Chapter 18. Securing Cisco devices
18.1. Creating a privileged user account
18.2. Reconfiguring the VTY lines
18.2.1. Enabling SSH and disabling Telnet access
18.2.2. Restricting SSH access using access lists
18.3. Securing the console port
18.4. Commands used in this chapter
Chapter 19. Facilitating troubleshooting using logging and debuging
19.1. Configuring the logging buffer
19.2.1. Debugging Port Security
19.2.3. Debugging the VLAN Trunking Protocol
19.2.4. Debugging IP routing
19.4. Configuring syslogging
19.5. Commands used in this chapter
Chapter 20. Recovering from disaster
20.1. Narrow the scope to a subset of devices
20.2.1. Scheduling a reload
20.3. Deleting the startup configuration
20.4.1. Resetting the password on a router
20.4.2. Resetting the password on a switch
20.5. Commands used in this chapter
Chapter 21. Performance and health checklist
21.1. Is the CPU being overloaded?
21.2. What’s the system uptime?
21.3. Is there a damaged network cable or jack?
21.4. Are ping times unusually high or inconsistent?
21.5. Are routes flapping?
21.6. Commands in this chapter
2.1. Certification resources
22.2. Cisco’s Virtual Internet Routing Lab
22.3. Troubleshooting end-user connectivity
22.4. Never the end
Fair Use Sources
Cisco: Cisco Networking, Cisco DevOps - Cisco SRE, Cisco Cloud Native - Cisco and Kubernetes, Cisco Cloud - Cisco Data Centers, Cisco GitHub - Cisco Open Source (), Cisco Development Tools (), Cisco Programming Languages (), Cisco APIs, Cisco and Concurrent Parallel Programming (), Cisco and Functional Programming (), Cisco and Microservices, Cisco Security - Cisco Security Breaches, Cisco Research, Cisco Data Science - Cisco DataOps - Cisco Databases, Cisco Artificial Intelligence (Cisco ML - Cisco MLOps, Cisco DL, Cisco AR - Cisco VR), Cisco IoT, Cisco Products - Cisco Services (), Cisco Operating Systems (), Cisco Software (), Cisco Hardware - Cisco Devices (), Cisco Support (), Cisco Media (), Cisco Communication (), Cisco Concepts (), Cisco acronyms (), Cisco Founders (), Cisco People (), Cisco Outline, Cisco History, Cisco Timeline, Cisco Subsidiaries (), Cisco Privacy (), Cisco Censorship (), Cisco Criticism (), Cisco Bibliography, Cisco Courses, Cisco Certification (CCNA, CCNP, CCNE), Cisco Glossary, Cisco Topics, Cisco Blog, Cisco Awesome List, Big Tech. (navbar_cisco, navbar_networking)
Networking: TCP/IP, Internet protocols, K8S networking-K8S nets-K8S net, Container net,
Cloud networking-Cloud nets (AWS net, Azure net, GCP net, IBM net, Oracle net)
Oracle networking-Oracle nets-Oracle net-Oracle network-Oracle networks, Oracle Cloud networking-Oracle Cloud nets-Oracle Cloud net-Oracle Cloud network-Oracle Cloud networks,
Docker networking-Docker nets-Docker net-Docker network-Docker networks,
Podman networking-Podman nets-Podman net-Podman network-Podman networks,
OpenShift networking-OpenShift nets-OpenShift net-OpenShift network-OpenShift networks,
IBM mainframe networking-IBM mainframe nets-IBM mainframe net-IBM mainframe network-IBM mainframe networks,
IP networking-IP nets-IP net-IP network-IP networks, TCP/IP networking-TCP/IP nets-TCP/IP net-TCP/IP network-TCP/IP networks,
OS networking-OS nets-OS net-OS network-OS networks, Operating system networking-Operating system nets-Operating system net-Operating system network-Operating system networks,
Linux networking-Linux nets-Linux net-Linux network-Linux networks,
UNIX networking-UNIX nets-UNIX net-UNIX network-UNIX networks,
RHEL networking-RHEL nets-RHEL net-RHEL network-RHEL networks,
Fedora networking-Fedora nets-Fedora net-Fedora network-Fedora networks,
Rocky networking-Rocky nets-Rocky net-Rocky network-Rocky networks,
Debian networking-Debian nets-Debian net-Debian network-Debian networks, Ubuntu networking-Ubuntu nets-Ubuntu net-Ubuntu network-Ubuntu networks,
IBM networking-IBM nets-IBM net-IBM network-IBM networks, SNA networking-SNA nets-SNA net-SNA network-SNA networks,
Ansible networking-Ansible nets-Ansible net-Ansible network-Ansible networks,
macOS networking-macOS nets-macOS net-macOS network-macOS networks, Apple networking-Apple nets-Apple net-Apple network-Apple networks,
Windows networking-Windows nets-Windows net-Windows network-Windows networks,
Microsoft networking-Microsoft nets-Microsoft net-Microsoft network-Microsoft networks,
Windows Server networking-Windows Server nets-Window Server net-Windows Server network-Windows Server networks,
Cisco networking-Cisco nets-Cisco net-Cisco network-Cisco networks,
Palo Alto networking-Palo Alto nets-Palo Alto net-Palo Alto network-Palo Alto networks,
3Com networking-3Com nets-3Com net-3Com network-3Com networks, Novell networking-Novell nets-Novell net-Novell network-Novell networks, NetWare networking-NetWare nets-NetWare net-NetWare network-NetWare networks, Novell NetWare networking-Novell NetWare nets-Novell NetWare net-Novell NetWare network-Novell NetWare networks,
Networking by Programming Languages
C networking-C nets-C net-C network-C networks, C Language networking-C Language nets-C Language net-C Language network-C Language networks,
C++ networking-C plus plus nets-C plus plus net-C plus plus network-C plus plus networks,
C# networking-C sharp nets-C sharp net-C sharp network-C sharp networks, C# .NET networking-C sharp dot net nets-C sharp dot net net-C sharp dot net network-C sharp dot net networks,
Go networking-Go nets-Go net-Go network-Go networks, Golang networking-Golang nets-Golang net-Golang network-Golang networks,
Java networking-Java nets-Java net-Java network-Java networks,
JavaScript networking-JavaScript nets-JavaScript net-JavaScript network-JavaScript networks, JS networking-JS nets-JS net-JS network-JS networks, TypeScript networking-TypeScript nets-TypeScript net-TypeScript network-TypeScript networks,
Node.js networking-Node.js nets-Node.js net-Node.js network-Node.js networks,
Kotlin networking-Kotlin nets-Kotlin net-Kotlin network-Kotlin networks,
Scala networking-Scala nets-Scala net-Scala network-Scala networks,
Python networking-Python nets-Python net-Python network-Python networks,
PowerShell networking-PowerShell nets-PowerShell net-PowerShell network-PowerShell networks,
Ruby networking-Ruby nets-Ruby net-Ruby network-Ruby networks,
Swift networking-Swift nets-Swift net-Swift network-Swift networks,
© 1994 - 2024 Cloud Monk Losang Jinpa or Fair Use. Disclaimers
SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.