30
Edward Tetz 6 IN 1 BOOKS BOOKS • Overview • Internet Protocols • Switching • Routing • Wireless • Security Cisco ® Networking ALL-IN-ONE Making Everything Easier!

Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Edward Tetz

6 IN 1BOOKSBOOKS

• Overview• Internet Protocols• Switching• Routing• Wireless• Security

Cisco® NetworkingA L L - I N - O N E

Making Everything Easier!™

Open the book and find:

• A detailed look at network design

• Binary and hexadecimal essentials

• How to work with the Cisco IOS

• What you should know about network classes

• A guide to Cisco Discovery Protocol

• Technologies involved in creating a WAN

• Tips on wireless frequency management

• How to combat DDOS and sniffer attacks

Edward Tetz has worked with computers as a sales associate, support

tech, trainer, and consultant. He holds the Cisco CCNA and numerous

other certifications, and has provided system and LAN support to both

large and small organizations. Ed is coauthor of CompTIA A+ Certification

All-in-One For Dummies.

$39.99 US / $47.99 CN / £27 .99 UK

ISBN 978-0-470-94558-2

Networking

Go to Dummies.com®

for videos, step-by-step examples, how-to articles, or to shop!

Need to network with thebest of ’em? Get started with Cisco and this bookSo you’re going to manage a Cisco network, and you’re a little overwhelmed by all that entails? Fear not, brave network admin! Here’s a practical, hands-on guide to each major aspect of a Cisco network. Learn all about TCP/IP, how to work with switches and routers, advice on laying out a wireless network, how to keep your network secure, and more.

• All for one — learn the network management basics that apply to all types of networks

• Know the parts — get a complete overview of the products that make up a typical office network

• Translate alphabet soup — understand IPv4, IPv6, TCP, UDP, ARP, LANs, and VLANs

• Switch it on — examine the essentials of switches, make switch configurations, and establish fault tolerance

• The route to success — see what routers do; configure the router, serial connections, and WAN links; and choose a routing protocol

• Plan your WLAN — understand wireless benefits, different wireless technologies, and Cisco wireless solutions

• Lock it down — secure your network with Cisco’s Adaptive Security Appliances or with ACLs and NAT

• Do it right — know the likely attacks and follow security best practices

Overview

Intern

et Pro

toco

ls

Switch

ing

Ro

utin

g

Wireless

Security

Cisco

® Netw

orkingA

LL

-IN-O

NE

Tetz

Page 2: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Start with FREE Cheat SheetsCheat Sheets include • Checklists • Charts • Common Instructions • And Other Good Stuff!

Get Smart at Dummies.com Dummies.com makes your life easier with 1,000s of answers on everything from removing wallpaper to using the latest version of Windows.

Check out our • Videos • Illustrated Articles • Step-by-Step Instructions

Plus, each month you can win valuable prizes by entering our Dummies.com sweepstakes. *

Want a weekly dose of Dummies? Sign up for Newsletters on • Digital Photography • Microsoft Windows & Office • Personal Finance & Investing • Health & Wellness • Computing, iPods & Cell Phones • eBay • Internet • Food, Home & Garden

Find out “HOW” at Dummies.com

*Sweepstakes not currently available in all countries; visit Dummies.com for official rules.

Get More and Do More at Dummies.com®

To access the Cheat Sheet created specifically for this book, go to www.dummies.com/cheatsheet/cisconetworkingaio Mobile Apps

There’s a Dummies App for This and ThatWith more than 200 million books in print and over 1,600 unique titles, Dummies is a global leader in how-to information. Now you can get the same great Dummies information in an App. With topics such as Wine, Spanish, Digital Photography, Certification, and more, you’ll have instant access to the topics you need to know in a format you can trust.

To get information on all our Dummies apps, visit the following:

www.Dummies.com/go/mobile from your computer.

www.Dummies.com/go/iphone/apps from your phone.

Page 3: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Cisco® Networking

A L L - I N - O N E

FOR

DUMmIES‰

01_9780470945582-ffirs.indd i01_9780470945582-ffirs.indd i 8/17/11 7:44 PM8/17/11 7:44 PM

Page 4: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

01_9780470945582-ffirs.indd ii01_9780470945582-ffirs.indd ii 8/17/11 7:44 PM8/17/11 7:44 PM

Page 5: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

by Edward Tetz

Cisco® Networking

A L L - I N - O N E

FOR

DUMmIES‰

01_9780470945582-ffirs.indd iii01_9780470945582-ffirs.indd iii 8/17/11 7:44 PM8/17/11 7:44 PM

Page 6: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Cisco® Networking All-in-One For Dummies®

Published byJohn Wiley & Sons, Inc.111 River StreetHoboken, NJ 07030-5774

www.wiley.com

Copyright © 2011 by John Wiley & Sons, Inc., Indianapolis, Indiana

Published by John Wiley & Sons, Inc., Indianapolis, Indiana

Published simultaneously in Canada

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Trademarks: Wiley, the John Wiley & Sons, Inc. logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affi liates in the United States and other countries, and may not be used without written permission. Cisco is a registered trademark of Cisco Technology, Inc. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ. FULFILLMENT OF EACH COUPON OFFER IS THE SOLE RESPONSIBILITY OF THE OFFEROR.

For general information on our other products and services, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.

For technical support, please visit www.wiley.com/techsupport.

Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Not all content that is available in standard print versions of this book may appear or be packaged in all book formats. If you have purchased a version of this book that did not include media that is referenced by or accompanies a standard print version, you may request this media by visiting http://booksupport.wiley.com. For more information about Wiley products, visit us www.wiley.com.

Library of Congress Control Number is available from the Publisher.

ISBN 978-0-470-94558-2 (pbk); ISBN 978-1-118-13783-3 (ebk); ISBN 978-1-118-13784-0 (ebk); ISBN 978-1-118-13785-7 (ebk)

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

01_9780470945582-ffirs.indd iv01_9780470945582-ffirs.indd iv 8/17/11 7:44 PM8/17/11 7:44 PM

Page 7: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

About the AuthorEdward Tetz graduated in 1990 from Saint Lawrence College in Cornwall, Ontario with a degree in business administration. He spent a short time in computer sales and support. In 1994, he added training to his repertoire. Since 2002, Edward has been a computer consultant for a value-added reseller, specializing in enterprise infrastructure in Halifax, Nova Scotia. Ed has continued to increase and improve his knowledge and skills through industry recognized certifi cations.

Some of the certifi cations Edward holds include Cisco Certifi ed Network Associate (CCNA), VMware Certifi ed Professional (VCP), A+, ITIL (IT Infrastructure Library) Foundation certifi cate in IT service management, Microsoft Certifi ed Trainer (MCT), Microsoft Certifi ed Systems Engineer (MCSE), Microsoft Certifi ed Database Administrator (MCDBA), and the Chauncey Group Certifi ed Technical Trainer (CTT). During his work experience, he has supported Apple Macintosh, IBM OS/2, Linux, Novell NetWare, and all Microsoft operating systems from MS-DOS to Windows 2008, as well as hardware from most of the major vendors.

Ed has designed and coauthored with Glen E. Clarke the award nominated CompTIA A+ Certifi cation All-In-One For Dummies and has worked on certifi cation titles involving topics, such as Windows and Cisco.

Ed welcomes comments from his readers and can be contacted at [email protected].

01_9780470945582-ffirs.indd v01_9780470945582-ffirs.indd v 8/17/11 7:44 PM8/17/11 7:44 PM

Page 8: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

01_9780470945582-ffirs.indd vi01_9780470945582-ffirs.indd vi 8/17/11 7:44 PM8/17/11 7:44 PM

Page 9: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

DedicationI want to dedicate this book, with love, to my wife Sharon and my daughters Emily and Mackenzie. They have always shown support in all my endeavors, at a cost of time with them. If I owe anyone my gratitude for having written this book, it is them.

Author’s AcknowledgmentsI want to thank Katie Mohr, my acquisitions editor, for inviting me to take on this project, and to Katie Feltman for letting her know about me. A great thanks to Katie Mohr and Jean Nelson, project editor, for keeping this book on track, which I am sure was an effort for them. I cannot forget James Russell, development editor; Jennifer Riggs, Teresa Artman, Melba Hopper, Brian Walls, and Virginia Sanders, copy editors; and Dan DiNiccolo, technical editor, for making sense of my words, providing accuracy, and in many cases, making my words sound better then when I originally wrote them.

In addition to the editors, I want to thank the rest of the staff at Wiley Publishing who worked behind the scenes taking care of many of the details that are required to get this book into print, and I am sure that because of their hard work, this book will be a success.

01_9780470945582-ffirs.indd vii01_9780470945582-ffirs.indd vii 8/17/11 7:44 PM8/17/11 7:44 PM

Page 10: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Publisher’s Acknowledgments

We’re proud of this book; please send us your comments at http://dummies.custhelp.com. For other comments, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.

Some of the people who helped bring this book to market include the following:

Acquisitions and Editorial

Project Editors: Jean Nelson, James H. Russell

Senior Acquisitions Editor: Katie Mohr

Copy Editors: Teresa Artman, Melba Hopper, Jennifer Riggs, Virginia Sanders

Technical Editor: Dan DiNiccolo

Editorial Manager: Kevin Kirschner

Vertical Websites Project Manager: Laura Moss-Hollister

Vertical Websites Project Manager:

Jenny Swisher

Supervising Producer: Rich Graves

Vertical Websites Associate Producers: Josh Frank, Marilyn Hummel, Douglas Kuhn, Shawn Patrick

Editorial Assistant: Amanda Graham

Sr. Editorial Assistant: Cherie Case

Cover Photo: © iStockphoto.com / braverabbit

Cartoons: Rich Tennant (www.the5thwave.com)

Composition Services

Project Coordinator: Patrick Redmond

Layout and Graphics: Nikki Gately, Corrie Socolovitch

Proofreader: Evelyn Wellborn

Indexer: Rebecca R. Plunkett

Special Help: Brian Walls, Becky Whitney

Publishing and Editorial for Technology Dummies

Richard Swadley, Vice President and Executive Group Publisher

Andy Cummings, Vice President and Publisher

Mary Bednarek, Executive Acquisitions Director

Mary C. Corder, Editorial Director

Publishing for Consumer Dummies

Kathy Nebenhaus, Vice President and Executive Publisher

Composition Services

Debbie Stailey, Director of Composition Services

01_9780470945582-ffirs.indd viii01_9780470945582-ffirs.indd viii 8/17/11 7:44 PM8/17/11 7:44 PM

Page 11: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Contents at a GlanceIntroduction ................................................................ 1

Book I: Overview ......................................................... 5Chapter 1: Looking at the Cisco Network World ........................................................... 7Chapter 2: Exploring Cisco Network Design................................................................. 23Chapter 3: Knowing as Little as Possible about Math ................................................. 47Chapter 4: Testing Your Core Networking Knowledge ............................................... 59Chapter 5: Getting into the Cisco Internetwork Operating System ........................... 95

Book II: Internet Protocols ........................................ 131Chapter 1: Making the Most of IPv4 ............................................................................. 133Chapter 2: Choosing between Protocols: TCP and UDP ........................................... 159Chapter 3: Working with ARP, the IP Communication Model,

and Data Link Layer Troubleshooting ...................................................................... 177Chapter 4: Preparing for the Advent of IPv6 .............................................................. 203

Book III: Switching .................................................. 211Chapter 1: Reviewing the Enterprise LAN .................................................................. 213Chapter 2: Switching Basics ......................................................................................... 225Chapter 3: Confi guring Switches .................................................................................. 237Chapter 4: Easing Device Discovery with CDP ........................................................... 265Chapter 5: Virtualizing Networks with VLANs and VTP ........................................... 277Chapter 6: Adding Fault Tolerance with STP ............................................................. 295Chapter 7: Adding Fault Tolerance with EtherChannel ............................................ 315Chapter 8: Speeding Confi guration with Smartport Macros .................................... 327

Book IV: Routing ..................................................... 337Chapter 1: Making the Wide Area Network (WAN) Wide.......................................... 339Chapter 2: Cozying Up to Routing Basics ................................................................... 351Chapter 3: Router Confi guration .................................................................................. 365Chapter 4: Setting Up Static Routes............................................................................. 385Chapter 5: Confi guring Serial Connections and WAN Links ..................................... 395Chapter 6: Meeting the Routing Protocols ................................................................. 407Chapter 7: Checking Out RIP and EIGRP Characteristics and Design ..................... 419Chapter 8: Getting Comfortable with the OSPF and IS-IS Protocols ........................ 433Chapter 9: Routing with BGP and IP Multicast ........................................................... 451

02_9780470945582-ftoc.indd ix02_9780470945582-ftoc.indd ix 8/17/11 7:44 PM8/17/11 7:44 PM

Page 12: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Book V: Wireless ...................................................... 471Chapter 1: Getting Wise to Wireless LANs.................................................................. 473Chapter 2: Planning Your WLAN .................................................................................. 491Chapter 3: Securing Your WLAN .................................................................................. 519Chapter 4: Building a Cisco Wireless Network ........................................................... 535

Book VI: Security ..................................................... 555Chapter 1: Defending against Common Attacks with Basic Security Tools ........... 557Chapter 2: Securing Networks with Cisco’s Adaptive Security Appliance ............. 579Chapter 3: Securing Networks with ACLs and NAT ................................................... 611Chapter 4: Cisco Security Best Practices .................................................................... 633

Index ...................................................................... 655

02_9780470945582-ftoc.indd x02_9780470945582-ftoc.indd x 8/17/11 7:44 PM8/17/11 7:44 PM

Page 13: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Table of Contents

Introduction ................................................................. 1About This Book .............................................................................................. 1Conventions Used in This Book ..................................................................... 1Foolish Assumptions ....................................................................................... 2How This Book Is Organized .......................................................................... 2

Book I: Overview .................................................................................... 2Book II: Internet Protocols .................................................................... 2Book III: Switching.................................................................................. 2Book IV: Routing..................................................................................... 3Book V: Wireless .................................................................................... 3Book VI: Security .................................................................................... 3

Icons Used in This Book ................................................................................. 3Where to Go from Here ................................................................................... 4

Book I: Overview .......................................................... 5

Chapter 1: Looking at the Cisco Network World . . . . . . . . . . . . . . . . . . .7

Glazing Over the OSI Network Layer Model ................................................. 8Connecting with Switches ............................................................................ 13Moving On Up with Routers ......................................................................... 14Taking the Network Wireless ....................................................................... 15Securing Data with Firewalls ........................................................................ 16Adding a Network Voice (Over IP, That Is) ................................................ 17Focusing on Small Business Networks ........................................................ 19Taking Cisco Products Home ....................................................................... 20

Chapter 2: Exploring Cisco Network Design. . . . . . . . . . . . . . . . . . . . . .23

Embracing Methodologies ............................................................................ 23Intelligent Information Network (IIN) ................................................ 24Service-Oriented Network Architecture (SONA) ............................. 25Prepare, Plan, Design, Implement, Operate,

and Optimize (PPDIOO) ................................................................... 28Examining the Layered Network Model ...................................................... 37

Core layer .............................................................................................. 39Distribution layer ................................................................................. 40Access layer .......................................................................................... 42Enterprise modules ............................................................................. 44

02_9780470945582-ftoc.indd xi02_9780470945582-ftoc.indd xi 8/17/11 7:44 PM8/17/11 7:44 PM

Page 14: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Cisco Networking All-in-One For Dummiesxii

Chapter 3: Knowing as Little as Possible about Math. . . . . . . . . . . . . .47

Why These Number Systems Are Important .............................................. 48Working with Bits and Bytes ........................................................................ 50Pondering the Signifi cance of the Signifi cant Bit ....................................... 52Making Conversions ...................................................................................... 52

Converting Base 2 (binary) to Base 10 (decimal) ............................ 53Converting binary to Base 8 (octal) .................................................. 55Converting binary to Base 16 (hexadecimal) ................................... 56

Chapter 4: Testing Your Core Networking Knowledge . . . . . . . . . . . . .59

Layering the OSI Model ................................................................................. 60Layer 1: The physical layer ................................................................. 61Layer 2: The data link layer ................................................................ 62Layer 3: The network layer ................................................................. 63Layer 4: The transport layer ............................................................... 65Layer 5: The session layer .................................................................. 66Layer 6: The presentation layer ......................................................... 68Layer 7: The application layer ............................................................ 70

Troubleshooting by Layers .......................................................................... 72Troubleshooting the physical layer .................................................. 72Troubleshooting the data link layer .................................................. 73Troubleshooting network and transport layers .............................. 73Troubleshooting the application layer ............................................. 74

Framing Data .................................................................................................. 75Figuring Out Packets ..................................................................................... 77

Looking at packets ............................................................................... 78Viewing packet structure .................................................................... 79

Getting the Lowdown on Low-Level and High-Level Addressing ............ 80Taking control of MAC addresses ...................................................... 80Structuring the IP address .................................................................. 82Reviewing Internetwork Packet Exchange ........................................ 82Getting the basics with NetBIOS

Extended User Interface .................................................................. 83Watching the Traffi c Go By .......................................................................... 83

CSMA/CD ............................................................................................... 83CSMA/CA ............................................................................................... 84Choosing CSMA/CD or CSMA/CA ....................................................... 86

Sharking the Network Data ........................................................................... 87Capture options ................................................................................... 91Filtering captured data ........................................................................ 92

Chapter 5: Getting into the Cisco Internetwork Operating System. . .95

Working with the Internetwork Operating System .................................... 95Checking out the show command ..................................................... 96Understanding operating modes ..................................................... 101Getting going with the command line ............................................. 107

02_9780470945582-ftoc.indd xii02_9780470945582-ftoc.indd xii 8/17/11 7:44 PM8/17/11 7:44 PM

Page 15: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Table of Contents xiii

Tinkering with Device Connections .......................................................... 110Connecting directly via a Cisco rollover cable .............................. 111Connecting remotely via Telnet or SSH .......................................... 116Graphical confi guration interfaces .................................................. 118

Upgrading Firmware and Booting an IOS Image ...................................... 122Upgrading the IOS image................................................................... 122Managing the boot process .............................................................. 124

Book II: Internet Protocols ........................................ 131

Chapter 1: Making the Most of IPv4 . . . . . . . . . . . . . . . . . . . . . . . . . . . .133

Meeting TCP/IP, Belle of the Networking Ball .......................................... 134Comparing TCP/IP with the OSI Network Model ..................................... 135Comprehending the Structure of an IP Address ...................................... 136Knowing Your Network Classes ................................................................. 137

Class A ................................................................................................. 137Class B ................................................................................................. 138Class C ................................................................................................. 138Class D ................................................................................................. 138Class E ................................................................................................. 138Public, private, and automatic IP addresses .................................. 140Examining special IP addresses ....................................................... 141

Breaking Up Networks with Subnetting .................................................... 143Subnetting 101 .................................................................................... 144Mulling the number of hosts ............................................................ 145Modifying the subnet mask .............................................................. 146

Explaining Classless InterDomain Routing (CIDR) .................................. 150CIDR notation ..................................................................................... 151Variable Length Subnet Masks (VLSM) ........................................... 153Supernetting ....................................................................................... 15411111111.11111111.1111110.00000000 (255.255.254.0)

route summarization ..................................................................... 155

Chapter 2: Choosing between Protocols: TCP and UDP . . . . . . . . . . .159

Understanding the UDP and TCP Structure ............................................. 159Examining packet structure.............................................................. 160TCP and UDP header structures ...................................................... 164Sockets and ports .............................................................................. 166Checking out which services use which ports ............................... 169

Knowing When to Use TCP ......................................................................... 169Services that use TCP ........................................................................ 170Three-way handshaking .................................................................... 170Sliding windows ................................................................................. 172

Knowing When to Use UDP ........................................................................ 175

02_9780470945582-ftoc.indd xiii02_9780470945582-ftoc.indd xiii 8/17/11 7:44 PM8/17/11 7:44 PM

Page 16: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Cisco Networking All-in-One For Dummiesxiv

Chapter 3: Working with ARP, the IP Communication Model, and Data Link Layer Troubleshooting. . . . . . . . . . . . . . . . . . . .177

Watching Address Resolution Protocol in Action ................................... 178The logical AND .................................................................................. 178Using ARP ............................................................................................ 182

Troubleshooting with ARP ......................................................................... 189Checking out arp command options ............................................... 190Looking through your ARP cache with arp -a ................................ 190Adding a static ARP entry ................................................................. 191Seeing how ARP is useful .................................................................. 193

Using Other Troubleshooting Tools ......................................................... 194ping ...................................................................................................... 194traceroute/tracert .............................................................................. 199PathPing .............................................................................................. 201

Chapter 4: Preparing for the Advent of IPv6 . . . . . . . . . . . . . . . . . . . . .203

Reviewing Address Structure ..................................................................... 204Collapsing Addresses .................................................................................. 205Identifying Special Addresses .................................................................... 205Assigning Addresses ................................................................................... 207Integration with IPv4 ................................................................................... 209

Book III: Switching ................................................... 211

Chapter 1: Reviewing the Enterprise LAN . . . . . . . . . . . . . . . . . . . . . . .213

Identifying Features of an Enterprise LAN ............................................... 213Working with Cisco Switching Technologies ........................................... 215

Small-to-medium business products ............................................... 216Classical enterprise products .......................................................... 216

Reviewing Switching Standards ................................................................. 217Purchasing Support ..................................................................................... 221

Chapter 2: Switching Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .225

Switching and the OSI Model ..................................................................... 225Communicating with Duplex/Simplex ....................................................... 227Colliding and Broadcasting ........................................................................ 227Powering Up Your Switch ........................................................................... 230

Viewing status lights ......................................................................... 230Connecting the client cables ............................................................ 234

Chapter 3: Confi guring Switches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .237

Switching with the Internetwork Operating System (IOS) ..................... 237Connecting to Your Switch ......................................................................... 238

02_9780470945582-ftoc.indd xiv02_9780470945582-ftoc.indd xiv 8/17/11 7:44 PM8/17/11 7:44 PM

Page 17: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Table of Contents xv

Revealing Basic Switch Confi guration ....................................................... 240Setting a hostname ............................................................................ 240Examining ports and speeds ............................................................ 240Confi guring interfaces ....................................................................... 241Confi guring the management interface ........................................... 243Setting the default gateway .............................................................. 245Setting passwords .............................................................................. 246

Working with Users ..................................................................................... 252Creating a user in the account database ........................................ 253Removing a user ................................................................................. 253Enable user-level protection ............................................................ 253

Running Setup Wizard ................................................................................. 253Working with Web Console ........................................................................ 256

Dashboard .......................................................................................... 257Confi gure ............................................................................................. 257Monitor ................................................................................................ 262Maintenance ....................................................................................... 263Network Assistant .............................................................................. 263

Chapter 4: Easing Device Discovery with CDP. . . . . . . . . . . . . . . . . . .265

Discovering How CDP Operates ................................................................ 265Working with CDP ........................................................................................ 267

Seeing whether CDP is operating on a device ................................ 267Enabling CDP ...................................................................................... 268Disabling CDP ..................................................................................... 268Viewing information about devices ................................................. 268Checking traffi c data .......................................................................... 271Ogling CDP’s debug options ............................................................. 271Overlooking CDP miscellany ............................................................ 272

Building Your Network Layout .................................................................. 273

Chapter 5: Virtualizing Networks with VLANs and VTP . . . . . . . . . . .277

Implementing Virtual Local Area Networks (VLANs) ............................. 277Understanding how VLANs work ..................................................... 279Setting up VLANs ............................................................................... 282Confi guring a range of interfaces ..................................................... 283VLAN database ................................................................................... 285

Getting Started with VLAN Trunking Protocol (VTP) ............................. 285Learning how VTP works .................................................................. 286Implementing VTP ............................................................................. 287Being leery of the VTP confi guration revision number................. 287Pruning in the VTP tree ..................................................................... 288Confi guring VTP ................................................................................. 289Viewing your VTP settings ................................................................ 292

02_9780470945582-ftoc.indd xv02_9780470945582-ftoc.indd xv 8/17/11 7:44 PM8/17/11 7:44 PM

Page 18: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Cisco Networking All-in-One For Dummiesxvi

Chapter 6: Adding Fault Tolerance with STP . . . . . . . . . . . . . . . . . . . .295

Working with Spanning Tree Protocol (STP) ........................................... 295Building the initial topology ............................................................. 296Dealing with network changes ......................................................... 299

Setting Up STP .............................................................................................. 303STP and issues with VLANs .............................................................. 304STP and PortFast ................................................................................ 305

Troubleshooting STP .................................................................................. 308Debugging STP ............................................................................................. 311

Chapter 7: Adding Fault Tolerance with EtherChannel. . . . . . . . . . . .315

Examining How EtherChannel Works ....................................................... 316Checking Out EtherChannel Basic Guidelines ......................................... 319Setting Up EtherChannel ............................................................................. 320

Stepping through EtherChannel confi guration .............................. 320Confi guring EtherChannel load balancing ..................................... 322

Getting at Diagnostic Information for EtherChannel .............................. 323Debugging EtherChannel ............................................................................ 324

Chapter 8: Speeding Confi guration with Smartport Macros . . . . . . .327

Viewing Existing Smartport Macros .......................................................... 328Viewing macros using the brief option ........................................... 328Viewing macros without the brief option ....................................... 328Viewing details for a single macro ................................................... 331

Working with Macros .................................................................................. 332Rules for creating your own Smartport macro .............................. 332Smartport macros and parameters ................................................. 332Creating a sample macro .................................................................. 333Applying a Smartport macro to an interface .................................. 333Viewing ports that are using your macro ....................................... 334Removing a macro ............................................................................. 335

Book IV: Routing ...................................................... 337

Chapter 1: Making the Wide Area Network (WAN) Wide . . . . . . . . .339

Identifying Features of a WAN .................................................................... 339Sending data long distances ............................................................. 340Implementing routing protocols ...................................................... 340Using carrier equipment ................................................................... 340Getting a handle on network size .................................................... 341

Choosing Technologies ............................................................................... 343Getting the physical connection ...................................................... 343Choosing a routing protocol ............................................................ 345

02_9780470945582-ftoc.indd xvi02_9780470945582-ftoc.indd xvi 8/17/11 7:44 PM8/17/11 7:44 PM

Page 19: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Table of Contents xvii

Chapter 2: Cozying Up to Routing Basics. . . . . . . . . . . . . . . . . . . . . . . .351

Of Routers and Routing .............................................................................. 351Knowing why routers are useful ...................................................... 352Knowing what routers do ................................................................. 353Examining the routing process ........................................................ 353Viewing your router’s routing table ................................................ 355

Enabling Routing .......................................................................................... 356Working with DHCP ..................................................................................... 356

Setting up your DHCP server ............................................................ 359Watching the DHCP traffi c go by ..................................................... 361Getting DHCP help from the IP Helper ............................................ 363Automatic Private IP Addressing (APIPA) ...................................... 364

Chapter 3: Router Confi guration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .365

Getting to Know the Internetwork Operating System (IOS) for Routers ........................................................................ 365

Making Router Connections ....................................................................... 366Performing a Basic Confi guration .............................................................. 366

Setting the hostname ......................................................................... 366Confi guring standard router ports .................................................. 367Confi guring interfaces ....................................................................... 368Confi guring your router’s IP settings .............................................. 372Enabling routing ................................................................................. 372Confi guring passwords...................................................................... 373Setting banners .................................................................................. 379

Running Setup Wizard ................................................................................. 380Working with Users ..................................................................................... 382

Creating a user in the account database ........................................ 382Removing a user ................................................................................. 382Enable user-level protection ............................................................ 383Showing connected users ................................................................. 383

Chapter 4: Setting Up Static Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . .385

Knowing the Pros and Cons of Static Routing ......................................... 385Building a Small Network with Static Routing ......................................... 386

Getting network info from your router ........................................... 387Confi guring the second router ......................................................... 388Adding a third router ........................................................................ 392Running around and around with routing loops ........................... 393

Chapter 5: Confi guring Serial Connections and WAN Links . . . . . . .395

Finding Out Where the Telephone Company Fits In ............................... 395Circuit switching ................................................................................ 396Leased lines ........................................................................................ 397Packet switching ................................................................................ 397

02_9780470945582-ftoc.indd xvii02_9780470945582-ftoc.indd xvii 8/17/11 7:44 PM8/17/11 7:44 PM

Page 20: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Cisco Networking All-in-One For Dummiesxviii

Connecting Your Devices ........................................................................... 398Serial ports.......................................................................................... 399Integrated CSU/DSU ........................................................................... 399ISDN ports ........................................................................................... 400

Setting Up Your Serial Connection ............................................................ 400Confi guring your serial connection ................................................. 400Confi guring serial link protocols...................................................... 401Setting the clock rate ......................................................................... 402

Troubleshooting Serial Connections ........................................................ 403Showing ............................................................................................... 403Debugging ........................................................................................... 404

Chapter 6: Meeting the Routing Protocols. . . . . . . . . . . . . . . . . . . . . . .407

Checking Out Criteria for Routing Protocol Selection ............................ 407Classifying by where protocols are used ........................................ 408Classifying by how protocols calculate routing............................. 408Administrative distance .................................................................... 409

Introducing the Protocols .......................................................................... 410Distance-Vector Routing ............................................................................. 411

Examining basic function of distance-vector routing ................... 411Count to infi nity and routing loops ................................................. 412Preventing count to infi nity issues .................................................. 414

Link-State Routing ........................................................................................ 417Understanding link-state protocol ................................................... 417Working with your strengths............................................................ 418

Chapter 7: Checking Out RIP and EIGRP Characteristics and Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .419

Working with Routing Information Protocol (RIP) .................................. 419Understanding the RIP commands .................................................. 420Troubleshooting RIP .......................................................................... 422

Working with Enhanced Interior Gateway Routing Protocol (EIGRP) .... 425Using the EIGRP commands ............................................................. 425Troubleshooting EIGRP ..................................................................... 428

Chapter 8: Getting Comfortable with the OSPF and IS-IS Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .433

Open Shortest Path First (OSPF) ............................................................... 433Getting comfortable with OSPF basics ............................................ 433Confi guring OSPF ............................................................................... 437Working with wildcard masks .......................................................... 438Keeping track of router IDs............................................................... 440Troubleshooting OSPF ...................................................................... 441Debugging OSPF ................................................................................. 445

Intermediate System to Intermediate System (IS-IS) ............................... 446Enabling IS-IS routing ......................................................................... 447Checking that IS-IS is running ........................................................... 448Troubleshooting the IS-IS protocol.................................................. 449

02_9780470945582-ftoc.indd xviii02_9780470945582-ftoc.indd xviii 8/17/11 7:44 PM8/17/11 7:44 PM

Page 21: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Table of Contents xix

Chapter 9: Routing with BGP and IP Multicast. . . . . . . . . . . . . . . . . . .451

Routing with Border Gateway Protocol (BGP) ........................................ 451Routing via weights ........................................................................... 452Understanding BGP commands ....................................................... 452Viewing routes in your routing table............................................... 453Viewing how the protocol is functioning ........................................ 454Troubleshooting BGP ........................................................................ 454

Routing IP Multicast Traffi c ........................................................................ 458Knowing when to use multicast routing ......................................... 458Getting to know the protocols ......................................................... 459Confi guring multicast routing .......................................................... 462Troubleshooting multicast routing ................................................. 465

Book V: Wireless ...................................................... 471

Chapter 1: Getting Wise to Wireless LANs . . . . . . . . . . . . . . . . . . . . . .473

Understanding the Benefi t of Wireless LANs ........................................... 473Learning the Wireless Technologies ......................................................... 474Following the Standards ............................................................................. 475

Licensed radio bands ........................................................................ 475Unlicensed radio bands .................................................................... 476

Sending Data Over the Airwaves ............................................................... 478Understanding signals ....................................................................... 478Modulating signals ............................................................................. 479Introducing RF modulation techniques .......................................... 480

Battle of the Bands ...................................................................................... 482Checkin’ Out the 2.4-GHz band ........................................................ 483Keep on Rockin’ with the 5-GHz band ............................................. 488Technologies that support the 2.4-GHz and 5-GHz bands ............ 489

Chapter 2: Planning Your WLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .491

Setting Your Operation Mode .................................................................... 491Ad Hoc mode ...................................................................................... 492Infrastructure mode .......................................................................... 501

Grouping Your Clients with SSID ............................................................... 506SSID basics .......................................................................................... 507Using multiple SSIDs with a single AP ............................................. 507Basic service set (BSS) ...................................................................... 509Extended service set (ESS) ............................................................... 509

Planning Around Interference .................................................................... 509RF signal factors ................................................................................. 509Conducting a site survey .................................................................. 510

Working with Multiple APs ......................................................................... 514Selecting channels ............................................................................. 514AP layout ............................................................................................. 514Automatic tuning ............................................................................... 518

02_9780470945582-ftoc.indd xix02_9780470945582-ftoc.indd xix 8/17/11 7:44 PM8/17/11 7:44 PM

Page 22: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Cisco Networking All-in-One For Dummiesxx

Chapter 3: Securing Your WLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .519

Understanding the Benefi ts of a Secure WLAN ........................................ 519Finding balance between functionality and security .................... 520Recognizing security risks ................................................................ 520

Checking Out Security Risk Mitigation Methods ..................................... 521Authentication and data encryption ............................................... 522Filtering the MAC address ................................................................ 526Hiding the service set identifi er (SSID) ........................................... 527Intrusion detection and prevention ................................................ 528Isolating users with VLANs ............................................................... 528

Securing the Management Interface .......................................................... 531Changing default passwords ............................................................ 531Getting even more secure with SSH, SSL, TLS, HTTPS .................. 532Management access........................................................................... 533Isolating the entire WLAN ................................................................. 533

Chapter 4: Building a Cisco Wireless Network . . . . . . . . . . . . . . . . . .535

Introducing the Cisco Unifi ed Wireless Networks Architecture (CUWN)............................................................. 535

Keeping it simple with Wireless LAN Controllers .......................... 536Going mobile with Cisco WLAN

access point (AP) devices ............................................................. 540Cisco Wireless Control System (WCS) ............................................ 541

Lightweight Access Point Protocol (LWAPP) .......................................... 542Setting Up Your Wireless LAN ................................................................... 543

Setting up and verifying the wired LAN to which the WLAN will connect .................................................. 543

Setting up the Cisco Wireless LAN Controller(s)........................... 544Confi guring WLAN security .............................................................. 546Confi guring WEP keys ....................................................................... 547Setting up Cisco access points ......................................................... 548Confi guring backup controllers ....................................................... 549Web authentication process ............................................................ 550Using the Cisco graphical user interface (GUI) .............................. 552

Book VI: Security ..................................................... 555

Chapter 1: Defending against Common Attacks with Basic Security Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . .557

Knowing Your Enemy .................................................................................. 558Handling attacks from within ........................................................... 558Dealing with external attacks ........................................................... 564

Implementing Firewalls ............................................................................... 567Types of fi rewalls ............................................................................... 567Ingress and egress fi ltering ............................................................... 568Defending data with the DMZ ........................................................... 568

02_9780470945582-ftoc.indd xx02_9780470945582-ftoc.indd xx 8/17/11 7:44 PM8/17/11 7:44 PM

Page 23: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Table of Contents xxi

Defending Your Network against Attacks ................................................. 570Perimeter defense .............................................................................. 571Active tools ......................................................................................... 571Defense in depth ................................................................................ 572

Security Tools .............................................................................................. 573Personal fi rewalls ............................................................................... 573Antivirus software ............................................................................. 573Anti-malware....................................................................................... 574Spam fi lters ......................................................................................... 576Intrusion detection ............................................................................ 577Vulnerability scanners ...................................................................... 577User common sense .......................................................................... 577

Chapter 2: Securing Networks with Cisco’s Adaptive Security Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .579

Locating Firewalls in the OSI Model .......................................................... 579Getting to Know the Internetwork Operating System ............................. 580Making Connections .................................................................................... 580Running the ASA Setup Wizard .................................................................. 581Performing a Basic Confi guration .............................................................. 594

Device name ....................................................................................... 594Standard fi rewall ports ...................................................................... 595Interfaces ............................................................................................ 595IP addresses........................................................................................ 598Security zones .................................................................................... 598Passwords ........................................................................................... 598Banners ............................................................................................... 604

Setting Up User Accounts ........................................................................... 606Confi guring Dynamic Host Confi guration Protocol ................................ 607Examining Your License ............................................................................. 609

Chapter 3: Securing Networks with ACLs and NAT . . . . . . . . . . . . . .611

Securing Networks with ACLs .................................................................... 611Creating ACLs ............................................................................................... 612

Standard ACLs .................................................................................... 612Extended ACLs ................................................................................... 618

Applying an ACL .......................................................................................... 620Using ACLs as a Virus Detection Tool ....................................................... 623Where You Can Use ACLs ........................................................................... 625Setting up Network Address Translation ................................................. 625

Requirements for NAT....................................................................... 626Types of NAT ...................................................................................... 626Setting up NAT ................................................................................... 628Viewing translations .......................................................................... 631

02_9780470945582-ftoc.indd xxi02_9780470945582-ftoc.indd xxi 8/17/11 7:44 PM8/17/11 7:44 PM

Page 24: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Cisco Networking All-in-One For Dummiesxxii

Chapter 4: Cisco Security Best Practices . . . . . . . . . . . . . . . . . . . . . . .633

Management Areas ...................................................................................... 634Finding Out About Known Issues with Cisco Devices ............................ 634Leveraging Authentication, Authorization,

and Accounting ........................................................................................ 635Authentication fallback ..................................................................... 635Avoiding Type 7 passwords ............................................................. 635

Centralizing Log Collection and Monitoring ........................................... 638Collecting logs in one location ......................................................... 639Choosing a logging level ................................................................... 639Dealing with logging in the console,

monitor, and buffer ........................................................................ 640Implementing Secure Protocols ................................................................. 642Managing Confi gurations ............................................................................ 642

Password management ..................................................................... 643Managing services ............................................................................. 645Setting up timeouts ............................................................................ 645Keeping alive TCP ............................................................................. 646Leaving room for management ........................................................ 647Securing SNMP ................................................................................... 647Replacing and rolling back ............................................................... 648Taking the talking stick with terminal lock .................................... 649Using logs to tell you what is going on............................................ 650Managing network features .............................................................. 651

Getting Physical with Security ................................................................... 652

Index ....................................................................... 655

02_9780470945582-ftoc.indd xxii02_9780470945582-ftoc.indd xxii 8/17/11 7:44 PM8/17/11 7:44 PM

Page 25: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Introduction

Cisco networking devices fill the needs in just about every area of your network. Although many books can help you get your Cisco certifica-

tion, such as CCENT Certification All-in-One For Dummies by Glen E. Clarke, this book is not geared to getting you to pass a Cisco Certification exam. Instead, this book gives you the key information that you need to manage your network of Cisco devices.

About This BookCisco Networking All-in-One For Dummies is a practical, hands-on guide to managing your Cisco network devices. Although you can read this entire book from front to back, you do not have to. This book is a reference guide. Each minibook is divided into chapters, and each chapter into sections, each of which contains information about a specific task or feature that you may want to investigate or implement.

Although you can take fastidious notes, create flash cards, and memorize everything in this book, do not feel that you need to. Just keep the book handy as a reference. That way, if you are unsure about a particular topic, you can quickly review this book and get your answer.

Conventions Used in This BookConventions make your life easier by making things work in an expected manner. As far as conventions go, I make use of several in this book:

✦ Italics identifies new terms that I define or to add emphasis.

✦ Bold highlights keywords in a list, steps in numbered lists, or com-mands or text that you type.

✦ Monofont sets off URLs (such as www.dummies.com) or indicates a command within regular text. Code lines use a similar font, such as the following example:

Switch1>enableSwitch1#configure terminal...Switch1(config)#end

03_9780470945582-intro.indd 103_9780470945582-intro.indd 1 8/17/11 7:44 PM8/17/11 7:44 PM

Page 26: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

2 Foolish Assumptions

Foolish AssumptionsIn writing this book, I had to make a few assumptions about you as a reader:

✦ You are familiar with the operation of a computer and specifically the installing and execution of a terminal emulator program such as putty. (Do not worry — if you can launch the program, I will show you how to use it.)

✦ You have Cisco equipment to work with. While you can follow along with the examples I have given in the book, to really get a feel for how things work, it is best to do them yourself.

How This Book Is OrganizedAs with all the All-in-One For Dummies books, chapters are organized into minibooks. The chapters in each minibook are related by a specific theme or topic. For example, Book V contains all wireless-related content needed to work with wireless devices on your network.

The following sections outline what you can find in each minibook.

Book I: OverviewIn this minibook, I cover a mixed bag of information that I think you need to know if you are going to get into working with networks and managing your network. Much of what I discuss here is not specific to Cisco networks, but rather all networks regardless of whose logo is on the front of the hardware. This minibook includes a bit of networking design principles, a bit of number systems, and a bit about the Cisco Internetwork Operating System (IOS).

Book II: Internet ProtocolsIn Book II, I focus on the most widely used networking protocol in the world, the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. Because this may be the only protocol you ever need to use, I devote an entire mini-book to it. This knowledge helps you when working on any network.

Book III: SwitchingSwitching and Cisco switches are the focus of Book III. You see the configu-ration process from powering up the first time out of the box. I then show you how to use the main switching technologies, such as user isolation with virtual local area networks (VLANs) and redundancy with EtherChannel.

03_9780470945582-intro.indd 203_9780470945582-intro.indd 2 8/17/11 7:44 PM8/17/11 7:44 PM

Page 27: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

3Icons Used in This Book

Book IV: RoutingRouting data with Cisco routers occupies your time as you work your way through Book IV. In this minibook, you get a view from the initial setup, through basic configuration, static routing, and dynamic routing protocols. By the time you read through this minibook, you can navigate the network routing waters.

Book V: WirelessBook V gives you all the information you need to know about how to lay out your wireless network. I cover the main wireless technologies in the market and show you how to secure a wireless network. I also introduce the major classes of Cisco wireless devices.

Book VI: SecurityThe security information in Book VI lets you into “the know” on several Cisco-related security items that cross the different hardware platforms in the Cisco product line. After reading this minibook, you are aware of what risks you may face on your network and the common ways you can reduce them.

Icons Used in This BookTo make your experience with the book easier, I use various icons in the margins of the book to indicate particular points of interest.

Information that is helpful to you is indicated with a Tip icon. Expect to find shortcuts and timesavers here.

The Remember icon is a friendly reminder for something that you want to make sure to keep in mind. This icon features information that may be useful to remember on the job.

Information that could cause problems to you or to the network is indicated with a Warning icon. If you see a Warning icon, make sure you read it. The network you save may be your own.

Sometimes I feel obligated to give you some technical information that may be above and beyond what you really need to know. I have included it because some people may feel that the background or in-depth point may crystallize an idea.

03_9780470945582-intro.indd 303_9780470945582-intro.indd 3 8/17/11 7:44 PM8/17/11 7:44 PM

Page 28: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

4 Where to Go from Here

Where to Go from HereLook over the Table of Contents or the index, and find something that catches your attention or a topic that you think can help you solve a problem. You can also just keep turning pages and start reading at Book I, Chapter 1.

After you spend some time using your fancy Cisco knowledge, you may be interested in certification. You may be interested in pursuing one of several Cisco certifications; if so, this book gives you a good start. However, to get certified, you need to take an exam. The certifications that you may be inter-ested in include

✦ Cisco Certified Entry Networking Technician (CCENT): Validates your skills to manage — from installation to troubleshooting — a small branch network in all aspects. CCENT is the type of position that would be occupied by someone who is new to the world of networking and is the first step toward getting the CCNA certification. Many books can help you pass your exam, including CCENT Certification All-in-One For Dummies by Glen E. Clarke.

✦ Cisco Certified Network Associate (CCNA): Validates your ability to manage most aspects of an Enterprise network, including features like Wide Area Network (WAN) connections, routing protocols, security, and advanced troubleshooting. If you are interested in pursuing this topic, a good place to start is CCNA Certification All-in-One For Dummies by Silviu Angelescu.

✦ Cisco Certified Design Associate (CCDA): Validates your knowledge sur-rounding Cisco Enterprise networks and your ability to plan a converged network including routing and switching infrastructures; WAN and broadband access for organizations; and design around security, voice, and wireless networks.

03_9780470945582-intro.indd 403_9780470945582-intro.indd 4 8/17/11 7:44 PM8/17/11 7:44 PM

Page 29: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Book I

Overview

04_9780470945582-pp01.indd 504_9780470945582-pp01.indd 5 8/17/11 7:42 PM8/17/11 7:42 PM

Page 30: Cisco - download.e-bookshelf.de · tech, trainer, and consultant. He holds the Cisco CCNA and numerous other certifications, and has provided system and LAN support to both large

Contents at a Glance

Chapter 1: Looking at the Cisco Network World . . . . . . . . . . . . . . . . . . .7

Glazing Over the OSI Network Layer Model ................................................. 8Connecting with Switches ............................................................................ 13Moving On Up with Routers ......................................................................... 14Taking the Network Wireless ....................................................................... 15Securing Data with Firewalls ........................................................................ 16Adding a Network Voice (Over IP, That Is) ................................................ 17Focusing on Small Business Networks ........................................................ 19Taking Cisco Products Home ....................................................................... 20

Chapter 2: Exploring Cisco Network Design. . . . . . . . . . . . . . . . . . . . . .23

Embracing Methodologies ............................................................................ 23Examining the Layered Network Model ...................................................... 37

Chapter 3: Knowing as Little as Possible about Math. . . . . . . . . . . . . .47

Why These Number Systems Are Important .............................................. 48Working with Bits and Bytes ........................................................................ 50Pondering the Signifi cance of the Signifi cant Bit ....................................... 52Making Conversions ...................................................................................... 52

Chapter 4: Testing Your Core Networking Knowledge . . . . . . . . . . . . .59

Layering the OSI Model ................................................................................. 60Troubleshooting by Layers .......................................................................... 72Framing Data .................................................................................................. 75Figuring Out Packets ..................................................................................... 77Getting the Lowdown on Low-Level and High-Level Addressing ............ 80Watching the Traffi c Go By .......................................................................... 83Sharking the Network Data ........................................................................... 87

Chapter 5: Getting into the Cisco Internetwork Operating System. . .95

Working with the Internetwork Operating System .................................... 95Tinkering with Device Connections .......................................................... 110Upgrading Firmware and Booting an IOS Image ...................................... 122

04_9780470945582-pp01.indd 604_9780470945582-pp01.indd 6 8/17/11 7:42 PM8/17/11 7:42 PM