Cisco Networking All-in-One For Dummies - Edward Tetz - E-Book

Cisco Networking All-in-One For Dummies E-Book

Edward Tetz

0,0
29,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

A helpful guide on all things Cisco

Do you wish that the complex topics of routers, switches, and networking could be presented in a simple, understandable presentation? With Cisco Networking All-in-One For Dummies, they are! This expansive reference is packed with all the information you need to learn to use Cisco routers and switches to develop and manage secure Cisco networks. This straightforward-by-fun guide offers expansive coverage of Cisco and breaks down intricate subjects such as networking, virtualization, and database technologies into easily digestible pieces.

  • Drills down complex subjects concerning Cisco networking into easy-to-understand, straightforward coverage
  • Shares best practices for utilizing Cisco switches and routers to implement, secure, and optimize Cisco networks
  • Reviews Cisco networking solutions and products, securing Cisco networks, and optimizing Cisco networks
  • Details how to design and implement Cisco networks

Whether you're new to Cisco networking products and services or an experienced professional looking to refresh your knowledge about Cisco, this For Dummies guide provides you with the coverage, solutions, and best practices you need.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 996

Veröffentlichungsjahr: 2011

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Cisco® Networking All-in-One For Dummies®

Visit www.dummies.com/cheatsheet/cisconetworkingaio to view this book's cheat sheet.

Table of Contents

Introduction
About This Book
Conventions Used in This Book
Foolish Assumptions
How This Book Is Organized
Book I: Overview
Book II: Internet Protocols
Book III: Switching
Book IV: Routing
Book V: Wireless
Book VI: Security
Icons Used in This Book
Where to Go from Here
Book I: Overview
Book I: Chapter 1: Looking at the Cisco Network World
Glazing Over the OSI Network Layer Model
Connecting with Switches
Moving On Up with Routers
Taking the Network Wireless
Securing Data with Firewalls
Adding a Network Voice (Over IP, That Is)
Focusing on Small Business Networks
Taking Cisco Products Home
Book I: Chapter 2: Exploring Cisco Network Design
Embracing Methodologies
Intelligent Information Network (IIN)
Service-Oriented Network Architecture (SONA)
Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO)
Examining the Layered Network Model
Core layer
Distribution layer
Access layer
Enterprise modules
Book I: Chapter 3: Knowing as Little as Possible about Math
Why These Number Systems Are Important
Working with Bits and Bytes
Pondering the Significance of the Significant Bit
Making Conversions
Converting Base 2 (binary) to Base 10 (decimal)
Converting binary to Base 8 (octal)
Converting binary to Base 16 (hexadecimal)
Book I: Chapter 4: Testing Your Core Networking Knowledge
Layering the OSI Model
Layer 1: The physical layer
Layer 2: The data link layer
Layer 3: The network layer
Layer 4: The transport layer
Layer 5: The session layer
Layer 6: The presentation layer
Layer 7: The application layer
Troubleshooting by Layers
Troubleshooting the physical layer
Troubleshooting the data link layer
Troubleshooting network and transport layers
Troubleshooting the application layer
Framing Data
Figuring Out Packets
Looking at packets
Viewing packet structure
Getting the Lowdown on Low-Level and High-Level Addressing
Taking control of MAC addresses
Structuring the IP address
Reviewing Internetwork Packet Exchange
Getting the basics with NetBIOS Extended User Interface
Watching the Traffic Go By
CSMA/CD
CSMA/CA
Choosing CSMA/CD or CSMA/CA
Sharking the Network Data
Capture options
Filtering captured data
Book I: Chapter 5: Getting into the Cisco Internetwork Operating System
Working with the Internetwork Operating System
Checking out the show command
Understanding operating modes
Getting going with the command line
Tinkering with Device Connections
Connecting directly via a Cisco rollover cable
Connecting remotely via Telnet or SSH
Graphical configuration interfaces
Upgrading Firmware and Booting an IOS Image
Upgrading the IOS image
Managing the boot process
Book II: Internet Protocols
Book II: Chapter 1: Making the Most of IPv4
Meeting TCP/IP, Belle of the Networking Ball
Comparing TCP/IP with the OSI Network Model
Comprehending the Structure of an IP Address
Knowing Your Network Classes
Class A
Class B
Class C
Class D
Class E
Public, private, and automatic IP addresses
Examining special IP addresses
Breaking Up Networks with Subnetting
Subnetting 101
Mulling the number of hosts
Modifying the subnet mask
Explaining Classless InterDomain Routing (CIDR)
CIDR notation
Variable Length Subnet Masks (VLSM)
Supernetting
11111111.11111111.1111110.00000000 (255.255.254.0) route summarization
Book II: Chapter 2: Choosing between Protocols: TCP and UDP
Understanding the UDP and TCP Structure
Examining packet structure
TCP and UDP header structures
Sockets and ports
Checking out which services use which ports
Knowing When to Use TCP
Services that use TCP
Three-way handshaking
Sliding windows
Knowing When to Use UDP
Book II: Chapter 3: Working with ARP, the IP Communication Model, and Data Link Layer Troubleshooting
Watching Address Resolution Protocol in Action
The logical AND
Using ARP
Troubleshooting with ARP
Checking out arp command options
Looking through your ARP cache with arp -a
Adding a static ARP entry
Seeing how ARP is useful
Using Other Troubleshooting Tools
ping
traceroute/tracert
PathPing
Book II: Chapter 4: Preparing for the Advent of IPv6
Reviewing Address Structure
Collapsing Addresses
Identifying Special Addresses
Assigning Addresses
Integration with IPv4
Book III: Switching
Book III: Chapter 1: Reviewing the Enterprise LAN
Identifying Features of an Enterprise LAN
Working with Cisco Switching Technologies
Small-to-medium business products
Classical enterprise products
Reviewing Switching Standards
Purchasing Support
Book III: Chapter 2: Switching Basics
Switching and the OSI Model
Communicating with Duplex/Simplex
Colliding and Broadcasting
Powering Up Your Switch
Viewing status lights
Connecting the client cables
Book III: Chapter 3: Configuring Switches
Switching with the Internetwork Operating System (IOS)
Connecting to Your Switch
Revealing Basic Switch Configuration
Setting a hostname
Examining ports and speeds
Configuring interfaces
Configuring the management interface
Setting the default gateway
Setting passwords
Working with Users
Creating a user in the account database
Removing a user
Enable user-level protection
Running Setup Wizard
Working with Web Console
Dashboard
Configure
Monitor
Maintenance
Network Assistant
Book III: Chapter 4: Easing Device Discovery with CDP
Discovering How CDP Operates
Working with CDP
Seeing whether CDP is operating on a device
Enabling CDP
Disabling CDP
Viewing information about devices
Checking traffic data
Ogling CDP’s debug options
Overlooking CDP miscellany
Building Your Network Layout
Book III: Chapter 5: Virtualizing Networks with VLANs and VTP
Implementing Virtual Local Area Networks (VLANs)
Understanding how VLANs work
Setting up VLANs
Configuring a range of interfaces
VLAN database
Getting Started with VLAN Trunking Protocol (VTP)
Learning how VTP works
Implementing VTP
Being leery of the VTP configuration revision number
Pruning in the VTP tree
Configuring VTP
Viewing your VTP settings
Book III: Chapter 6: Adding Fault Tolerance with STP
Working with Spanning Tree Protocol (STP)
Building the initial topology
Dealing with network changes
Setting Up STP
STP and issues with VLANs
STP and PortFast
Troubleshooting STP
Debugging STP
Book III: Chapter 7: Adding Fault Tolerance with EtherChannel
Examining How EtherChannel Works
Checking Out EtherChannel Basic Guidelines
Setting Up EtherChannel
Stepping through EtherChannel configuration
Configuring EtherChannel load balancing
Getting at Diagnostic Information for EtherChannel
Debugging EtherChannel
Book III: Chapter 8: Speeding Configuration with Smartport Macros
Viewing Existing Smartport Macros
Viewing macros using the brief option
Viewing macros without the brief option
Viewing details for a single macro
Working with Macros
Rules for creating your own Smartport macro
Smartport macros and parameters
Creating a sample macro
Applying a Smartport macro to an interface
Viewing ports that are using your macro
Removing a macro
Book IV: Routing
Book IV: Chapter 1: Making the Wide Area Network (WAN) Wide
Identifying Features of a WAN
Sending data long distances
Implementing routing protocols
Using carrier equipment
Getting a handle on network size
Choosing Technologies
Getting the physical connection
Choosing a routing protocol
Book IV: Chapter 2: Cozying Up to Routing Basics
Of Routers and Routing
Knowing why routers are useful
Knowing what routers do
Examining the routing process
Viewing your router’s routing table
Enabling Routing
Working with DHCP
Setting up your DHCP server
Watching the DHCP traffic go by
Getting DHCP help from the IP Helper
Automatic Private IP Addressing (APIPA)
Book IV: Chapter 3: Router Configuration
Getting to Know the Internetwork Operating System (IOS) for Routers
Making Router Connections
Performing a Basic Configuration
Setting the hostname
Configuring standard router ports
Configuring interfaces
Configuring your router’s IP settings
Enabling routing
Configuring passwords
Setting banners
Running Setup Wizard
Working with Users
Creating a user in the account database
Removing a user
Enable user-level protection
Showing connected users
Book IV: Chapter 4: Setting Up Static Routes
Knowing the Pros and Cons of Static Routing
Building a Small Network with Static Routing
Getting network info from your router
Configuring the second router
Adding a third router
Running around and around with routing loops
Book IV: Chapter 5: Configuring Serial Connections and WAN Links
Finding Out Where the Telephone Company Fits In
Circuit switching
Leased lines
Packet switching
Connecting Your Devices
Serial ports
Integrated CSU/DSU
ISDN ports
Setting Up Your Serial Connection
Configuring your serial connection
Configuring serial link protocols
Setting the clock rate
Troubleshooting Serial Connections
Showing
Debugging
Book IV: Chapter 6: Meeting the Routing Protocols
Checking Out Criteria for Routing Protocol Selection
Classifying by where protocols are used
Classifying by how protocols calculate routing
Administrative distance
Introducing the Protocols
Distance-Vector Routing
Examining basic function of distance-vector routing
Count to infinity and routing loops
Preventing count to infinity issues
Link-State Routing
Understanding link-state protocol
Working with your strengths
Book IV: Chapter 7: Checking Out RIP and EIGRP Characteristics and Design
Working with Routing Information Protocol (RIP)
Understanding the RIP commands
Troubleshooting RIP
Working with Enhanced Interior Gateway Routing Protocol (EIGRP)
Using the EIGRP commands
Troubleshooting EIGRP
Book IV: Chapter 8: Getting Comfortable with the OSPF and IS-IS Protocols
Open Shortest Path First (OSPF)
Getting comfortable with OSPF basics
Configuring OSPF
Working with wildcard masks
Keeping track of router IDs
Troubleshooting OSPF
Debugging OSPF
Intermediate System to Intermediate System (IS-IS)
Enabling IS-IS routing
Checking that IS-IS is running
Troubleshooting the IS-IS protocol
Book IV: Chapter 9: Routing with BGP and IP Multicast
Routing with Border Gateway Protocol (BGP)
Routing via weights
Understanding BGP commands
Viewing routes in your routing table
Viewing how the protocol is functioning
Troubleshooting BGP
Routing IP Multicast Traffic
Knowing when to use multicast routing
Getting to know the protocols
Configuring multicast routing
Troubleshooting multicast routing
Book V: Wireless
Book V: Chapter 1: Getting Wise to Wireless LANs
Understanding the Benefit of Wireless LANs
Learning the Wireless Technologies
Following the Standards
Licensed radio bands
Unlicensed radio bands
Sending Data Over the Airwaves
Understanding signals
Modulating signals
Introducing RF modulation techniques
Battle of the Bands
Checkin’ Out the 2.4-GHz band
Keep on Rockin’ with the 5-GHz band
Technologies that support the 2.4-GHz and 5-GHz bands
Book V: Chapter 2: Planning Your WLAN
Setting Your Operation Mode
Ad Hoc mode
Infrastructure mode
Grouping Your Clients with SSID
SSID basics
Using multiple SSIDs with a single AP
Basic service set (BSS)
Extended service set (ESS)
Planning Around Interference
RF signal factors
Conducting a site survey
Working with Multiple APs
Selecting channels
AP layout
Automatic tuning
Book V: Chapter 3: Securing Your WLAN
Understanding the Benefits of a Secure WLAN
Finding balance between functionality and security
Recognizing security risks
Checking Out Security Risk Mitigation Methods
Authentication and data encryption
Filtering the MAC address
Hiding the service set identifier (SSID)
Intrusion detection and prevention
Isolating users with VLANs
Securing the Management Interface
Changing default passwords
Getting even more secure with SSH, SSL, TLS, HTTPS
Management access
Isolating the entire WLAN
Book V: Chapter 4: Building a Cisco Wireless Network
Introducing the Cisco Unified Wireless Networks Architecture (CUWN)
Keeping it simple with Wireless LAN Controllers
Going mobile with Cisco WLAN access point (AP) devices
Cisco Wireless Control System (WCS)
Lightweight Access Point Protocol (LWAPP)
Setting Up Your Wireless LAN
Setting up and verifying the wired LAN to which the WLAN will connect
Setting up the Cisco Wireless LAN Controller(s)
Configuring WLAN security
Configuring WEP keys
Setting up Cisco access points
Configuring backup controllers
Web authentication process
Using the Cisco graphical user interface (GUI)
Book VI: Security
Book VI: Chapter 1: Defending against Common Attacks with Basic Security Tools
Knowing Your Enemy
Handling attacks from within
Dealing with external attacks
Implementing Firewalls
Types of firewalls
Ingress and egress filtering
Defending data with the DMZ
Defending Your Network against Attacks
Perimeter defense
Active tools
Defense in depth
Security Tools
Personal firewalls
Antivirus software
Anti-malware
Spam filters
Intrusion detection
Vulnerability scanners
User common sense
Book VI: Chapter 2: Securing Networks with Cisco’s Adaptive Security Appliance
Locating Firewalls in the OSI Model
Getting to Know the Internetwork Operating System
Making Connections
Running the ASA Setup Wizard
Performing a Basic Configuration
Device name
Standard firewall ports
Interfaces
IP addresses
Security zones
Passwords
Banners
Setting Up User Accounts
Configuring Dynamic Host Configuration Protocol
Examining Your License
Book VI: Chapter 3: Securing Networks with ACLs and NAT
Securing Networks with ACLs
Creating ACLs
Standard ACLs
Extended ACLs
Applying an ACL
Using ACLs as a Virus Detection Tool
Where You Can Use ACLs
Setting Up Network Address Translation
Requirements for NAT
Types of NAT
Setting up NAT
Viewing translations
Book VI: Chapter 4: Cisco Security Best Practices
Management Areas
Finding Out About Known Issues with Cisco Devices
Leveraging Authentication, Authorization, and Accounting
Authentication fallback
Avoiding Type 7 passwords
Centralizing Log Collection and Monitoring
Collecting logs in one location
Choosing a logging level
Dealing with logging in the console, monitor, and buffer
Implementing Secure Protocols
Managing Configurations
Password management
Managing services
Setting up timeouts
Keeping alive TCP
Leaving room for management
Securing SNMP
Replacing and rolling back
Taking the talking stick with terminal lock
Using logs to tell you what is going on
Managing network features
Getting Physical with Security
Cheat Sheet

Cisco® Networking All-in-One For Dummies®

by Edward Tetz

Cisco® Networking All-in-One For Dummies®

Published byJohn Wiley & Sons, Inc.111 River St.Hoboken, NJ 07030-5774

www.wiley.com

Copyright © 2012 by John Wiley & Sons, Inc.

Published by John Wiley & Sons, Inc., Hoboken, NJ

Published simultaneously in Canada

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Trademarks: Wiley, the John Wiley & Sons, Inc. logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc., and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.

For technical support, please visit www.wiley.com/techsupport.

Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Not all content that is available in standard print versions of this book may appear or be packaged in all book formats. If you have purchased a version of this book that did not include media that is referenced by or accompanies a standard print version, you may request this media by visiting http://booksupport.wiley.com. For more information about Wiley products, visit us at www.wiley.com.

Library of Congress Control Number is available from the Publisher.

ISBN 978-0-470-94558-2 (pbk); ISBN 978-1-118-13783-3 (ebk); ISBN 978-1-118-13784-0 (ebk); ISBN 978-1-118-13785-7 (ebk)

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

About the Author

Edward Tetz graduated in 1990 from Saint Lawrence College in Cornwall, Ontario with a degree in business administration. He spent a short time in computer sales and support. In 1994, he added training to his repertoire. Since 2002, Edward has been a computer consultant for a value-added reseller, specializing in enterprise infrastructure in Halifax, Nova Scotia. Ed has continued to increase and improve his knowledge and skills through industry recognized certifications.

Some of the certifications Edward holds include Cisco Certified Network Associate (CCNA), VMware Certified Professional (VCP), A+, ITIL (IT Infrastructure Library) Foundation certificate in IT service management, Microsoft Certified Trainer (MCT), Microsoft Certified Systems Engineer (MCSE), Microsoft Certified Database Administrator (MCDBA), and the Chauncey Group Certified Technical Trainer (CTT). During his work experience, he has supported Apple Macintosh, IBM OS/2, Linux, Novell NetWare, and all Microsoft operating systems from MS-DOS to Windows 2008, as well as hardware from most of the major vendors.

Ed has designed and coauthored with Glen E. Clarke the award nominated CompTIA A+ Certification All-In-One For Dummies and has worked on certification titles involving topics, such as Windows and Cisco.

Ed welcomes comments from his readers and can be contacted at [email protected]

Dedication

I want to dedicate this book, with love, to my wife Sharon and my daughters Emily and Mackenzie. They have always shown support in all my endeavors, at a cost of time with them. If I owe anyone my gratitude for having written this book, it is them.

Author's Acknowledgments

I want to thank Katie Mohr, my acquisitions editor, for inviting me to take on this project, and to Katie Feltman for letting her know about me. A great thanks to Katie Mohr and Jean Nelson, project editor, for keeping this book on track, which I am sure was an effort for them. I cannot forget James Russell, development editor; Jennifer Riggs, Teresa Artman, Melba Hopper, Brian Walls, and Virginia Sanders, copy editors; and Dan DiNiccolo, technical editor, for making sense of my words, providing accuracy, and in many cases, making my words sound better then when I originally wrote them.

In addition to the editors, I want to thank the rest of the staff at Wiley Publishing who worked behind the scenes taking care of many of the details that are required to get this book into print, and I am sure that because of their hard work, this book will be a success.

Publisher’s Acknowledgments

We’re proud of this book; please send us your comments at http://dummies.custhelp.com. For other comments, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.

Some of the people who helped bring this book to market include the following:

Acquisitions, Editorial, and Vertical Websites

Project Editors: Jean Nelson, James H. Russell

Senior Acquisitions Editor: Katie Mohr

Copy Editors: Teresa Artman, Melba Hopper, Jennifer Riggs, Virginia Sanders

Technical Editor: Dan DiNiccolo

Editorial Manager: Kevin Kirschner

Vertical Websites Project Managers: Laura Moss-Hollister, Laura Moss-Hollister

Supervising Producer: Rich Graves

Vertical Websites Associate Producers: Josh Frank, Marilyn Hummel, Douglas Kuhn, Shawn Patrick

Editorial Assistant: Amanda Graham

Sr. Editorial Assistant: Cherie Case

Cover Photos: © iStockphoto.com / braverabbit

Cartoons: Rich Tennant (www.the5thwave.com)

Composition Services

Project Coordinator: Patrick Redmond

Layout and Graphics: Nikki Gately, Corrie Socolovitch

Proofreader: Evelyn Wellborn

Indexer: Rebecca R. Plunkett

Special Help: Brian Walls, Becky Whitney

Publishing and Editorial for Technology Dummies

Richard Swadley, Vice President and Executive Group Publisher

Andy Cummings, Vice President and Publisher

Mary Bednarek, Executive Acquisitions Director

Mary C. Corder, Editorial Director

Publishing for Consumer Dummies

Kathy Nebenhaus, Vice President and Executive Publisher

Composition Services

Debbie Stailey, Director of Composition Services

Introduction

Cisco networking devices fill the needs in just about every area of your network. Although many books can help you get your Cisco certification, such as CCENT Certification All-in-One For Dummies by Glen E. Clarke, this book is not geared to getting you to pass a Cisco Certification exam. Instead, this book gives you the key information that you need to manage your network of Cisco devices.

About This Book

Cisco Networking All-in-One For Dummies is a practical, hands-on guide to managing your Cisco network devices. Although you can read this entire book from front to back, you do not have to. This book is a reference guide. Each minibook is divided into chapters, and each chapter into sections, each of which contains information about a specific task or feature that you may want to investigate or implement.

Although you can take fastidious notes, create flash cards, and memorize everything in this book, do not feel that you need to. Just keep the book handy as a reference. That way, if you are unsure about a particular topic, you can quickly review this book and get your answer.

Conventions Used in This Book

Conventions make your life easier by making things work in an expected manner. As far as conventions go, I make use of several in this book:

• Italics identifies new terms that I define or to add emphasis.

• Bold highlights keywords in a list, steps in numbered lists, or commands or text that you type.

• Monofont sets off URLs (such as www.dummies.com) or indicates a command within regular text. Code lines use a similar font, such as the following example:

Switch1>enable

Switch1#configure terminal

...

Switch1(config)#end

Foolish Assumptions

In writing this book, I had to make a few assumptions about you as a reader:

• You are familiar with the operation of a computer and specifically the installing and execution of a terminal emulator program such as putty. (Do not worry — if you can launch the program, I will show you how to use it.)

• You have Cisco equipment to work with. While you can follow along with the examples I have given in the book, to really get a feel for how things work, it is best to do them yourself.

How This Book Is Organized

As with all the All-in-One For Dummies books, chapters are organized into minibooks. The chapters in each minibook are related by a specific theme or topic. For example, Book V contains all wireless-related content needed to work with wireless devices on your network.

The following sections outline what you can find in each minibook.

Book I: Overview

In this minibook, I cover a mixed bag of information that I think you need to know if you are going to get into working with networks and managing your network. Much of what I discuss here is not specific to Cisco networks, but rather all networks regardless of whose logo is on the front of the hardware. This minibook includes a bit of networking design principles, a bit of number systems, and a bit about the Cisco Internetwork Operating System (IOS).

Book II: Internet Protocols

In Book II, I focus on the most widely used networking protocol in the world, the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. Because this may be the only protocol you ever need to use, I devote an entire minibook to it. This knowledge helps you when working on any network.

Book III: Switching

Switching and Cisco switches are the focus of Book III. You see the configuration process from powering up the first time out of the box. I then show you how to use the main switching technologies, such as user isolation with virtual local area networks (VLANs) and redundancy with EtherChannel.

Book IV: Routing

Routing data with Cisco routers occupies your time as you work your way through Book IV. In this minibook, you get a view from the initial setup, through basic configuration, static routing, and dynamic routing protocols. By the time you read through this minibook, you can navigate the network routing waters.

Book V: Wireless

Book V gives you all the information you need to know about how to lay out your wireless network. I cover the main wireless technologies in the market and show you how to secure a wireless network. I also introduce the major classes of Cisco wireless devices.

Book VI: Security

The security information in Book VI lets you into “the know” on several Cisco-related security items that cross the different hardware platforms in the Cisco product line. After reading this minibook, you are aware of what risks you may face on your network and the common ways you can reduce them.

Icons Used in This Book

To make your experience with the book easier, I use various icons in the margins of the book to indicate particular points of interest.

Information that is helpful to you is indicated with a Tip icon. Expect to find shortcuts and timesavers here.

The Remember icon is a friendly reminder for something that you want to make sure to keep in mind. This icon features information that may be useful to remember on the job.

Information that could cause problems to you or to the network is indicated with a Warning icon. If you see a Warning icon, make sure you read it. The network you save may be your own.

Sometimes I feel obligated to give you some technical information that may be above and beyond what you really need to know. I have included it because some people may feel that the background or in-depth point may crystallize an idea.

Where to Go from Here

Look over the Table of Contents or the index, and find something that catches your attention or a topic that you think can help you solve a problem. You can also just keep turning pages and start reading at Book I, Chapter 1.

After you spend some time using your fancy Cisco knowledge, you may be interested in certification. You may be interested in pursuing one of several Cisco certifications; if so, this book gives you a good start. However, to get certified, you need to take an exam. The certifications that you may be interested in include

• Cisco Certified Entry Networking Technician (CCENT): Validates your skills to manage — from installation to troubleshooting — a small branch network in all aspects. CCENT is the type of position that would be occupied by someone who is new to the world of networking and is the first step toward getting the CCNA certification. Many books can help you pass your exam, including CCENT Certification All-in-One For Dummies by Glen E. Clarke.

• Cisco Certified Network Associate (CCNA): Validates your ability to manage most aspects of an Enterprise network, including features like Wide Area Network (WAN) connections, routing protocols, security, and advanced troubleshooting. If you are interested in pursuing this topic, a good place to start is CCNA Certification All-in-One For Dummies by Silviu Angelescu.

• Cisco Certified Design Associate (CCDA): Validates your knowledge surrounding Cisco Enterprise networks and your ability to plan a converged network including routing and switching infrastructures; WAN and broadband access for organizations; and design around security, voice, and wireless networks.

Please note that some special symbols used in this eBook may not display properly on all eReader devices. If you have trouble determining any symbol, please call Wiley Product Technical Support at 800-762-2974. Outside of the United States, please call 317-572-3993. You can also contact Wiley Product Technical Support at www.wiley.com/techsupport.

Book I

Overview

Chapter 1: Looking at the Cisco Network World

In This Chapter

Meeting the OSI model (it does not bite . . . hard)

Working with switches, routers, and firewalls

Going wireless

Getting your network voice

Checking out the Cisco product lines

If you are reading this book, you likely either have a network that is made up of Cisco networking products or you want to introduce the Cisco network products into your network. Although this book focuses its attention on Cisco products, you do not have to have Cisco network devices on your network to receive a benefit from reading this book. Although you examine many features that are specific to Cisco products, you also gain a wide range of networking knowledge that applies to all networking hardware, regardless of the vendor.

This chapter performs a quick overview of all the devices that exist on your network, allowing your computers, servers, and other user-related network devices to communicate with each other. I start with the network devices that your computer connects to and move further into the depths of the network from there, through routers and firewalls, then through wireless and network-connected phone hardware. After you read about these general hardware devices, you overview the classes of Cisco networking devices, such as enterprise, small business, and home devices.

After you read this chapter, you will have a rough grasp of network devices and how they all fit together on the network and an idea of the type of products that Cisco networking involves.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!