CCIE路由与交换认证考试指南(第二版 英文版)

CCIE路由与交换认证考试指南(第二版 英文版)
作 者: 奥登
出版社: 人民邮电
丛编项: Cisco 职业认证培训系列
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: CISCO认证考试
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

  本书提供作译者介绍Wendell Odom, CCIE No. 1624, is a senior instructor with Skyline Advanced Technology Services (http://www.skyline-ats.com), where he teaches the QOS, CCIE, and SAN courses. Wendell has worked in the networking arena for 20 years, with jobs in pre- and post-sales technical consulting, teaching, and course development. He has authored several Cisco Press books, including the bestselling CCNA INTRO and ICND Exam Certification Guides, the Cisco QoS...

内容简介

本书讲述了Cisco认证考试CCIE路由与交换(R&S)笔试所涉及的全部内容,此外,还介绍了CCIE服务提供商书面考试中与网络相关的内容。全书内容包括网络概念、设备操作、桥接与局域网(LAN)交换技术、广域网(WAN)、IP及IP路由选择协议、网络安全性以及多服务网络等。本书在介绍基本内容的同时,还提供了多种评估工具,以检查自己对某些内容的掌握情况。这些评估工具包括小测试、问题与答案、实践模拟练习以及CD-ROM中提供的200多道练习题。随书光盘中包含本书英文版的电子文档(以PDF格式提供)和500余道CCIE路由与交换考试模拟试题。本书适合准备参加CCIE认证考试的读者,也可供相关网络技术人员参考。.本书是优秀的Cisco认证考试指南,专门针对CCIE路由与交换考试内容编写。作者足著名的资深讲师和畅销书作者,在本书中将自己的备考和考试技巧与读者分享,帮助读者找出薄弱环节,增强理论知识与实践能力。本书行文简洁,旨在加强读者对考试主题的理解和记忆。..书中以一系列经实践证明十分有效的方法,向读者展示了一条清晰的备考路线。每章开头的“Do I Know This Already”测验帮助读者确定如何分配学习时间。考试主题列表和总结图表便于读者参考,在需要时还可以进行快速复习。章末的复习题帮助读者评估自己对知识的掌握程度并巩固重要概念。配套光盘中功能强大的测试引擎真实地模拟CCIE路由与交换考试,帮助读者尽快适应考试环境,并能记录考试成绩、提供反馈信息,进而指出需要进一步复习的内容,以便读者集中精力突破难关。在第二版的修订中对第一版的细节层次、评估特征和具有挑战性的复习题与练习都进行了周密的考虑和调整,以更好地帮助读者掌握概念和技术,顺利通过考试。...

图书目录

Contents

Part I Bridging and LAN Switching 2

Chapter 1 Ethernet Basics 5

 “Do I Know This Already?” Quiz 5

 Foundation Topics 8

  Ethernet Layer 1: Wiring, Speed, and Duplex 8

   RJ-45 Pinouts and Category 5 Wiring 8

   Auto-negotiation, Speed, and Duplex 9

    CSMA/CD 10

    Collision Domains and Switch Buffering 10

   Basic Switch Port Configuration 12

  Ethernet Layer 2: Framing and Addressing 14

   Types of Ethernet Addresses 16

   Ethernet Address Formats 17

   Protocol Types and the 802.3 Length Field 18

  Switching and Bridging Logic 19

 Foundation Summary 25

  Memory Builders 25

   Fill in Key Tables from Memory 25

   Definitions 25

   Further Reading 25

Chapter 2 Virtual LANs and VLAN Trunking 27

 “Do I Know This Already?” Quiz 27

 Foundation Topics 31

  Virtual LANs 31

   VLAN Configuration 31

    Using VLAN Database Mode to Create VLANs 32

    Using Configuration Mode to Put Interfaces into VLANs 34

    Using Configuration Mode to Create VLANs 35

   Private VLANs 36

  VLAN Trunking Protocol 38

   VTP Process and Revision Numbers 39

   VTP Configuration 40

    Normal-Range and Extended-Range VLANs 42

    Storing VLAN Configuration 43

  VLAN Trunking: ISL and 802.1Q 44

   ISL and 802.1Q Concepts 44

   ISL and 802.1Q Configuration 45

    Allowed, Active, and Pruned VLANs 48

    Trunk Configuration Compatibility 48

   Configuring Trunking on Routers 49

   802.1Q-in-Q Tunneling 51

 Foundation Summary 53

  Memory Builders 54

   Fill in Key Tables from Memory 54

   Definitions 54

   Further Reading 55

Chapter 3 Spanning Tree Protocol 57

 “Do I Know This Already?” Quiz 57

 Foundation Topics 61

  802.1D Spanning Tree Protocol 61

   Choosing Which Ports Forward: Choosing Root Ports and Designated Ports 61

    Electing a Root Switch 61

    Determining the Root Port 63

    Determining the Designated Port 64

   Converging to a New STP Topology 65

    Topology Change Notification and Updating the CAM 66

    Transitioning from Blocking to Forwarding 67

   Per-VLAN Spanning Tree and STP over Trunks 68

   STP Configuration and Analysis 70

  Optimizing Spanning Tree 73

   PortFast, UplinkFast, and BackboneFast 73

    PortFast 74

    UplinkFast 74

    BackboneFast 75

    PortFast, UplinkFast, and BackboneFast Configuration 75

   PortChannels 76

    Load Balancing Across PortChannels 76

    PortChannel Discovery and Configuration 77

   Rapid Spanning Tree Protocol 78

   Multiple Spanning Trees: IEEE 802.1s 80

  Protecting STP 82

   Root Guard and BPDU Guard: Protecting Access Ports 82

   UDLD and Loop Guard: Protecting Trunks 83

 Foundation Summary 85

  Memory Builders 87

   Fill in Key Tables from Memory 87

   Definitions 87

   Further Reading 87

Part II TCP/IP 89

Chapter 4 IP Addressing 91

 “Do I Know This Already?” Quiz 91

 Foundation Topics 94

  IP Addressing and Subnetting 94

   IP Addressing and Subnetting Review 94

    Subnetting a Classful Network Number 95

    Comments on Classless Addressing 97

   Subnetting Math 97

    Dissecting the Component Parts of an IP Address 97

    Finding Subnet Numbers and Valid Range of IP Addresses-Binary 98

    Decimal Shortcuts to Find the Subnet Number and Valid Range of IP Addresses 99

    Determining All Subnets of a Network-Binary 102

    Determining All Subnets of a Network-Decimal 104

   VLSM Subnet Allocation 105

   Route Summarization Concepts 107

    Finding Inclusive Summary Routes-Binary 108

    Finding Inclusive Summary Routes-Decimal 109

    Finding Exclusive Summary Routes-Binary 110

  CIDR, Private Addresses, and NAT 111

   Classless Interdomain Routing 111

   Private Addressing 113

   Network Address Translation 113

    Static NAT 115

    Dynamic NAT Without PAT 116

    Overloading NAT with Port Address Translation 117

    Dynamic NAT and PAT Configuration 118

  IP Version 6 119

   IPv6 Address Formats 120

   Aggregatable Global Unicast Addresses 120

   Simple IPv6 Configuration 121

   IPv6 Addressing Summary 123

 Foundation Summary 125

  Memory Builders 128

   Fill in Key Tables from Memory 128

   Definitions 129

   Further Reading 129

Chapter 5 IP Services 131

 “Do I Know This Already?” Quiz 131

 Foundation Topics 134

  ICMP 134

   ICMP Unreachable 135

   Time Exceeded ICMP Message 136

   ICMP Redirect 137

  ARP, Proxy ARP, Reverse ARP, BOOTP, and DHCP 137

   ARP and Proxy ARP 137

   RARP, BOOTP, and DHCP 139

  HSRP, VRRP, and GLBP 141

  Network Time Protocol 143

 Foundation Summary 146

  Memory Builders 148

   Fill in Key Tables from Memory 148

   Definitions 148

   Further Reading 149

Chapter 6 TCP/IP Transport and Application Services 151

 “Do I Know This Already?” Quiz 151

 Foundation Topics 154

  TCP and UDP 154

   TCP Connections and Port Numbers 155

   TCP Error Recovery 157

   TCP Dynamic Windowing 157

   TCP Header Miscellany 159

  TCP/IP Applications 160

   Passive and Active Mode FTP 161

   Application Authentication and Privacy 163

  Network Management and SNMP 163

   SNMP Protocol Messages 165

   SNMP MIBs 166

   SNMP Security 167

 Foundation Summary 168

  Memory Builders 168

   Fill in Key Tables from Memory 168

   Definitions 169

   Further Reading 169

Part III IP Routing 171

Chapter 7 IP Forwarding (Routing) 173

 “Do I Know This Already?” Quiz 173

 Foundation Topics 177

  IP Forwarding 177

   Process Switching, Fast Switching, and Cisco Express Forwarding 178

   Building Adjacency Information: ARP and Inverse ARP 179

    Frame Relay Inverse ARP 180

    Static Configuration of Frame Relay Mapping Information 183     Disabling InARP 184

   Classless and Classful Routing 185

  Multilayer Switching 186

   MLS Logic 186

   Using Routed Ports and PortChannels with MLS 187

   MLS Configuration 188

  Policy Routing 191

 Foundation Summary 197

  Memory Builders 198

   Fill in Key Tables from Memory 198

   Definitions 199

   Further Reading 199

Chapter 8 RIP Version 2 201

 “Do I Know This Already?” Quiz 201

 Foundation Topics 204

  RIP Version 2 Basics 204

  RIP Convergence and Loop Prevention 205

   Converged Steady-State Operation 206

   Triggered (Flash) Updates and Poisoned Routes 208

   RIP Convergence When Routing Updates Cease 210

   Convergence Extras 212

  RIP Configuration 213

   Enabling RIP and the Effects of Autosummarization 214

   RIP Authentication Configuration 216

   RIP Next-Hop Feature and Split Horizon 219

   RIP Offset Lists 220

   Route Filtering with Distribute Lists and Prefix Lists 222

 Foundation Summary 225

  Memory Builders 227

   Fill in Key Tables from Memory 227

   Definitions 227

   Further Reading 227

Chapter 9 EIGRP 229

 “Do I Know This Already?” Quiz 229

 Foundation Topics 233

  EIGRP Basics and Steady-State Operation 233

   Hellos, Neighbors, and Adjacencies 233

   EIGRP Updates 236

   The EIGRP Topology Table 238

  EIGRP Convergence 240

   Input Events and Local Computation 241

   Going Active on a Route 243

    Stuck-in-Active 245

    Limiting Query Scope 246

  EIGRP Configuration 246

   EIGRP Configuration Example 246

   EIGRP Load Balancing 249

   EIGRP Configuration Options That Are Similar to RIP 250

 Foundation Summary 251

  Memory Builders 253

   Fill in Key Tables from Memory 253

   Definitions 253

   Further Reading 253

Chapter 10 OSPF 255

 “Do I Know This Already?” Quiz 255

 Foundation Topics 260

  OSPF Database Exchange 260

   OSPF Router IDs 260

   Becoming Neighbors, Exchanging Databases, and Becoming Adjacent 261

    Becoming Neighbors: The Hello Process 263

    Flooding LSA Headers to Neighbors 264

    Requesting, Getting, and Acknowledging LSAs 265

   Designated Routers on LANs 266

    Designated Router Optimization on LANs 266

    DR Election on LANs 268

   Designated Routers on WANs and OSPF Network Types 269

    Caveats Regarding OSPF Network Types over NBMA Networks 270

    Example of OSPF Network Types and NBMA 271

   SPF Calculation 274

   Steady-State Operation 275

  OSPF Design and LSAs 275

   OSPF Design Terms 276

   LSA Types and Network Types 277

    LSA Types 1 and 2 278

    LSA Type 3 and Inter-Area Costs 281

    LSA Types 4 and 5, and External Route Types 1 and 2 284

    OSPF Design in Light of LSA Types 286

   Stubby Areas 287

  OSPF Configuration 290

    OSPF Costs and Clearing the OSPF Process 292

    Alternatives to the OSPF Network Command 295

   OSPF Filtering 295

    Filtering Routes Using the distribute-list Command 295

    OSPF ABR LSA Type 3 Filtering 297

    Filtering Type 3 LSAs with the area range Command 299

   Virtual Link Configuration 299

   Configuring OSPF Authentication 301

   OSPF Stub Router Configuration 303

 Foundation Summary 305

  Memory Builders 310

   Fill in Key Tables from Memory 310

   Definitions 310

   Further Reading 311

Chapter 11 IGP Route Redistribution, Route Summarization, and Default Routing 313

 “Do I Know This Already?” Quiz 313

 Foundation Topics 317

  Route Maps, Prefix Lists, and Administrative Distance 317

   Configuring Route Maps with the route-map Command 317

    Route Map match Commands for Route Redistribution 319

    Route Map set Commands for Route Redistribution 320

   IP Prefix Lists 321

   Administrative Distance 323

  Route Redistribution 324

   The Mechanics of the redistribute Command 324

    Redistribution Using Default Settings 325

    Setting Metrics, Metric Types, and Tags 328

   Redistributing a Subset of Routes Using a Route Map 329

   Mutual Redistribution at Multiple Routers 333

    Preventing Suboptimal Routes by Setting the Administrative Distance 335

    Preventing Suboptimal Routes by Using Route Tags 338

    Using Metrics and Metric Types to Influence Redistributed Routes 340

  Route Summarization 342

   EIGRP Route Summarization 344

   OSPF Route Summarization 344

   RIP Route Summarization 345

  Default Routes 345

Using Static Routes to 0.0.0.0, with redistribute static 347

    Using the default-information originate Command 348

   Using the ip default-network Command 349

   Using Route Summarization to Create Default Routes 350

 Foundation Summary 352

  Memory Builders 353

   Fill in Key Tables from Memory 353

   Definitions 353

   Further Reading 353

Chapter 12 Fundamental BGP Operations 355

 “Do I Know This Already?” Quiz 355

 Foundation Topics 360

  Building BGP Neighbor Relationships 361

   Internal BGP Neighbors 362

   External BGP Neighbors 365

   Checks Before Becoming BGP Neighbors 366

   BGP Messages and Neighbor States 368

    BGP Message Types 368

    Purposefully Resetting BGP Peer Connections 369

  Building the BGP Table 370

   Injecting Routes/Prefixes into the BGP Table 370

    The BGP network Command 370

    Redistributing from an IGP, Static, or Connected Route 373

    The Impact of Auto-Summary on Redistributed Routes and the network Command 375

    Manual Summaries and the AS_PATH Path Attribute 378

    Adding Default Routes to BGP 381 The ORIGIN Path Attribute 382

   Advertising BGP Routes to Neighbors 383

    The BGP Update Message 383

    Determining the Contents of Updates 384

    Example: Impact of the Decision Process and NEXT_HOP on BGP Updates 386

    Summary of Rules for Routes Advertised in BGP Updates 392

  Building the IP Routing Table 392

   Adding eBGP Routes to the IP Routing Table 392

   Backdoor Routes 393

   Adding iBGP Routes to the IP Routing Table 394

    Using Sync and Redistributing Routes 396

    Disabling Sync and Using BGP on All Routers in an AS 398

    Confederations 399

    Configuring Confederations 401

    Route Reflectors 404

 Foundation Summary 410

  Memory Builders 414

   Fill in Key Tables from Memory 414

   Definitions 414

   Further Reading 415

Chapter 13 BGP Routing Policies 417

 “Do I Know This Already?” Quiz 417

 Foundation Topics 423

  Route Filtering and Route Summarization 423

   Filtering BGP Updates Based on NLRI 424

    Route Map Rules for NLRI Filtering 427

    Soft Reconfiguration 428

    Comparing BGP Prefix Lists, Distribute Lists, and Route Maps 428

   Filtering Subnets of a Summary Using the aggregate-address Command 429

   Filtering BGP Updates by Matching the AS_PATH PA 430

    The BGP AS_PATH and AS_PATH Segment Types 431

    Using Regular Expressions to Match AS_PATH 433

    Example: Matching AS_PATHs Using AS_PATH Filters 436

    Matching AS_SET and AS_CONFED_SEQ 439

  BGP Path Attributes and the BGP Decision Process 442

   Generic Terms and Characteristics of BGP PAs 442

   The BGP Decision Process 444

   Clarifications of the BGP Decision Process 445

Two Final Tiebreaker Steps in the BGP Decision Process 445

   Adding Multiple BGP Routes to the IP Routing Table 446

   Mnemonics for Memorizing the Decision Process 446

  Configuring BGP Policies 448

   Background: BGP PAs and Features Used by Routing Policies 448

   Step 0: NEXT_HOP Reachable 450

   Step 1: Administrative Weight 450

   Step 2: Highest Local Preference (LOCAL_PREF) 453

   Step 3: Choose Between Locally Injected Routes Based on ORIGIN PA 456

   Step 4: Shortest AS_PATH 457

    Removing Private ASNs 457

    AS_PATH Prepending and Route Aggregation 458

   Step 5: Best ORIGIN PA 461

   Step 6: Smallest Multi-Exit Discriminator 461

    Configuring MED: Single Adjacent AS 463

    Configuring MED: Multiple Adjacent Autonomous Systems 464

    The Scope of MED 464

   Step 7: Prefer Neighbor Type eBGP over iBGP 465

   Step 8: Smallest IGP Metric to the NEXT_HOP 465

    The maximum-paths Command and BGP Decision Process Tiebreakers 465

   Step 9: Lowest BGP Router ID of Advertising Router (with One Exception) 466

   Step 10: Lowest Neighbor ID 466

    The BGP maximum-paths Command 466

  BGP Communities 468

    Matching COMMUNITY with Community Lists 472

    Removing COMMUNITY Values 473

    Filtering NLRI Using Special COMMUNITY Values 474

 Foundation Summary 476

  Memory Builders 480

   Fill in Key Tables from Memory 480

   Definitions 480

   Further Reading 480

Part IV Quality of Service 483

Chapter 14 Classification and Marking 485

 “Do I Know This Already?” Quiz 485

 Foundation Topics 489

  Fields That Can Be Marked for QoS Purposes 489

   IP Precedence and DSCP Compared 489

   DSCP Settings and Terminology 490

    The Class Selector PHB and DSCP Values 491

    The Assured Forwarding PHB and DSCP Values 491

    The Expedited Forwarding PHB and DSCP Values 492

   Non-IP Header Marking Fields 493

    Ethernet LAN Class of Service 493

    WAN Marking Fields 493

    Locations for Marking and Matching 494

  Cisco Modular QoS CLI 495

   The Mechanics of MQC 496

   Classification Using Class Maps 497

    Using Multiple match Commands 498

    Classification Using NBAR 499

  Classification and Marking Tools 500

   Class-Based Marking (CB Marking) Configuration 500

    CB Marking Example 501

    CB Marking of CoS and DSCP 505

    Network-Based Application Recognition 507

   CB Marking Design Choices 508

   Marking Using Policers 509

   Policy Routing for Marking 510

 Foundation Summary 511

  Memory Builders 513

   Fill in Key Tables from Memory 513

   Definitions 513

   Further Reading 513

Chapter 15 Congestion Management and Avoidance 515

 “Do I Know This Already?” Quiz 515

 Foundation Topics 519

  Cisco Router Queuing Concepts 519

   Software Queues and Hardware Queues 519

   Queuing on Interfaces Versus Subinterfaces and Virtual Circuits 520

   Comparing Queuing Tools 520

  Queuing Tools: FIFO, PQ, CQ, WFQ, CBWFQ, and LLQ 521

   FIFO Queuing 521

   Priority Queuing 522

   Custom Queuing 523

   Weighted Fair Queuing 524

    WFQ Scheduler: The Process 525

    WFQ Drop Policy, Number of Queues, and Queue Lengths 526

    Types of WFQ Queues 527

    WFQ Configuration 527

   Class-Based WFQ and Low-Latency Queuing 529

    CBWFQ Basic Features and Configuration 529

    Defining and Limiting CBWFQ Bandwidth 532

    Low-Latency Queuing 534

    Defining and Limiting LLQ Bandwidth 537

    LLQ with More Than One Priority Queue 538

    Miscellaneous CBWFQ/LLQ Topics 538

   Queuing Summary 538

  Weighted Random Early Detection 539

   How WRED Weights Packets 541

   WRED Configuration 542

  LAN Switch Congestion Management and Avoidance 542

   Cisco 3550 Switch Egress Queuing 543

   Cisco 3550 Congestion Avoidance 545

   Comparisons Between Cisco 3550 and 2950 Switches 547

 Foundation Summary 549

  Memory Builders 549

   Fill in Key Tables from Memory 549

   Definitions 549

   Further Reading 549

Chapter 16 Shaping and Policing 551

 “Do I Know This Already?” Quiz 551

 Foundation Topics 555

  Traffic-Shaping Concepts 555

   Shaping Terminology 555

   Shaping with an Excess Burst 557

   Underlying Mechanics of Shaping 557

   Traffic-Shaping Adaptation on Frame Relay Networks 559

  Class-Based Shaping Configuration 559

   Tuning Shaping for Voice Using LLQ and a Small Tc 561

   Configuring Shaping by Bandwidth Percent 564

   CB Shaping to a Peak Rate 565

   Adaptive Shaping 565

  Frame Relay Traffic Shaping Configuration 565

   FRTS Configuration Using the traffic-rate Command 567

   Setting FRTS Parameters Explicitly 568

   FRTS Configuration Using LLQ 569

   FRTS Adaptive Shaping 570

  Policing Concepts and Configuration 571

   CB Policing Concepts 571

    Single-Rate, Two-Color Policing (One Bucket) 571

    Single-Rate, Three-Color Policer (Two Buckets) 573

    Two-Rate, Three-Color Policer (Two Buckets) 573

   Class-Based Policing Configuration 575

    Single-Rate, Three-Color Policing of All Traffic 575

    Policing a Subset of the Traffic 576

    CB Policing Defaults for Bc and Be 577

    Configuring Dual-Rate Policing 577

    Multi-Action Policing 578

    Policing by Percentage 578

   Committed Access Rate 579

 Foundation Summary 582

  Memory Builders 584

   Fill in Key Tables from Memory 584

   Definitions 584

   Further Reading 585

Part V WAN 587

Chapter 17 Synchronous Serial Links and Protocols 589

 “Do I Know This Already?” Quiz 589

 Foundation Topics 592

  Synchronous Serial Links 592

   T1 Framing and Encoding 592

   T1 Alarms 594

   Carrier Detect and Interface Resets 594

  Point-to-Point Protocol 595

   PPP Link Control Protocol 596

    Basic LCP/PPP Configuration 597

    Multilink PPP 598

    MLP Link Fragmentation and Interleaving 600

   PPP Compression 601

    PPP Layer 2 Payload Compression 602

    Header Compression 602

 Foundation Summary 604

  Memory Builders 605

   Fill in Key Tables from Memory 605

   Definitions 605

   Further Reading 605

Chapter 18 Frame Relay 607

 “Do I Know This Already?” Quiz 607

 Foundation Topics 610

  Frame Relay Concepts 610

   Frame Relay Data Link Connection Identifiers 610

   Local Management Interface 611

   Frame Relay Headers and Encapsulation 612

   Frame Relay Congestion: DE, BECN, and FECN 613

    Adaptive Shaping, FECN, and BECN 614

    The Discard Eligibility Bit 615

  Frame Relay Configuration 615

   Frame Relay Configuration Basics 615

   Frame Relay Payload Compression 619

   Frame Relay Fragmentation 620

 Foundation Summary 623

  Memory Builders 624

   Fill in Key Tables from Memory 624

   Definitions 625

   Further Reading 625

Part VI IP Multicast 627

Chapter 19 Introduction to IP Multicasting 629

 “Do I Know This Already?” Quiz 629

 Foundation Topics 632

  Why Do You Need Multicasting? 632

   Problems with Unicast and Broadcast Methods 632

   How Multicasting Provides a Scalable and Manageable Solution 635

  Multicast IP Addresses 638

   Multicast Address Range and Structure 638

   Well-Known Multicast Addresses 638

    Multicast Addresses for Permanent Groups 639

    Multicast Addresses for Source-Specific Multicast Applications and Protocols 640

    Multicast Addresses for GLOP Addressing 640

    Multicast Addresses for Private Multicast Domains 640

   Multicast Addresses for Transient Groups 641

   Summary of Multicast Address Ranges 641

   Mapping IP Multicast Addresses to MAC Addresses 642

  Managing Distribution of Multicast Traffic with IGMP 643

   Joining a Group 644

   Internet Group Management Protocol 645

   IGMP Version 1 645

    IGMPv1 Host Membership Query Functions 646

    IGMPv1 Host Membership Report Functions 647

    IGMPv1 Leave Mechanism 651

    IGMPv1 Querier 651

   IGMP Version 2 651

    IGMPv2 Leave Group and Group-Specific Query Messages 654

    IGMPv2 Querier 656

   IGMPv1 and IGMPv2 Interoperability 657

    IGMPv2 Host and IGMPv1 Routers 657

    IGMPv1 Host and IGMPv2 Routers 658

    IGMPv1 and IGMPv2 Routers 658

   Timers Used in IGMPv1 and IGMPv2 659

   IGMP Version 3 659

   Comparison of IGMPv1, IGMPv2, and IGMPv3 661

   Multicast Listener Discovery Protocol 662

  LAN Multicast Optimizations 662

   Cisco Group Management Protocol 663

   IGMP Snooping 669

   Router-Port Group Management Protocol 673

 Foundation Summary 676

  Memory Builders 676

   Fill in Key Tables from Memory 677

   Definitions 677

   Further Reading 677

  References in This Chapter 677

Chapter 20 IP Multicast Routing 679

 “Do I Know This Already?” Quiz 679

 Foundation Topics 683

  Multicast Routing Basics 683

   Overview of Multicast Routing Protocols 684

    Multicast Forwarding Using Dense Mode 684

    Reverse-Path-Forwarding Check 685

    Multicast Forwarding Using Sparse Mode 687

   Multicast Scoping 689

    TTL Scoping 689

    Administrative Scoping 690

  Dense-Mode Routing Protocols 690

   Operation of Protocol Independent Multicast Dense Mode 691

    Forming PIM Adjacencies Using PIM Hello Messages 691

    Source-Based Distribution Trees 692

    Prune Message 693

    PIM-DM: Reacting to a Failed Link 695

    Rules for Pruning 697

    Steady-State Operation and the State Refresh Message 699

    Graft Message 700

   LAN-Specific Issues with PIM-DM and PIM-SM 702

    Prune Override 702

    Assert Message 703

    Designated Router 704

    Summary of PIM-DM Messages 705

   Distance Vector Multicast Routing Protocol 706

   Multicast Open Shortest Path First 706

  Sparse-Mode Routing Protocols 707

   Operation of Protocol Independent Multicast Sparse Mode 707

    Similarities Between PIM-DM and PIM-SM 707

    Sources Sending Packets to the Rendezvous Point 708

    Joining the Shared Tree 710

    Completion of the Source Registration Process 712

    Shared Distribution Tree 714

    Steady-State Operation by Continuing to Send Joins 715

    Examining the RP’s Multicast Routing Table 716

    Shortest-Path Tree Switchover 717

    Pruning from the Shared Tree 719

   Dynamically Finding RPs and Using Redundant RPs 720

    Dynamically Finding the RP Using Auto-RP 721

    Dynamically Finding the RP Using BSR 724

    Anycast RP with MSDP 726

    Summary: Finding the RP 728

   Bidirectional PIM 729

   Comparison of PIM-DM and PIM-SM 730

 Foundation Summary 732

  Memory Builders 736

   Fill in Key Tables from Memory 736

   Definitions 736

   Further Reading 737

Part VII Security 739

Chapter 21 Security 741

 “Do I Know This Already?” Quiz 741

 Foundation Topics 745

  Router and Switch Device Security 745

   Simple Password Protection for the CLI 745

    Better Protection of Enable and Username Passwords 746

   User Mode and Privileged Mode AAA Authentication 747

    Using a Default Set of Authentication Methods 748

    Using Multiple Authentication Methods 749

    Groups of AAA Servers 750

    Overriding the Defaults for Login Security 751

   PPP Security 752

  Layer 2 Security 752

Switch Security Best Practices for Unused and User Ports 753

     Port Security 754

    Dynamic ARP Inspection 758

    DHCP Snooping 761

    IP Source Guard 763

    802.1X Authentication Using EAP 764

   General Layer 2 Security Recommendations 766

  Layer 3 Security 768

   IP Access Control List Review 769

    ACL Rule Summary 770

    Wildcard Masks 772

   General Layer 3 Security Considerations 772

    Smurf Attacks, Directed Broadcasts, and RPF Checks 772

    Inappropriate IP Addresses 774

    TCP SYN Flood, the Established Bit, and TCP Intercept 775

 Foundation Summary 778

  Memory Builders 780

   Fill in Key Tables from Memory 780

   Definitions 781

   Further Reading 781

Part VIII Enterprise Wireless Mobility 783

Chapter 22 IEEE 802.11 Fundamentals 785

 “Do I Know This Already?” Quiz 785

 Foundation Topics 788

  802.11 Physical Layer Standards 788

   802.11a 788

   802.11b 789

   802.11g 790

   802.11n 791

   Comparison of 802.11 Standards 791

  Wireless System Configuration 791

   Infrastructure Mode Configuration 792

   Ad Hoc Mode Configuration 794

  Wireless Hardware Components 794

   Radio Cards 795

   Access Points 795

   Antennas 795

   Repeaters 796

   Bridges 797

   Routers 797

   Radio Frequency Peripherals 797

  Infrastructure Mode Operation 798

   Scanning 798

    Passive Scanning 798

    Active Scanning 799

   Connecting with a Network 799

   Data Transfer 799

   Roaming 800

  Ad Hoc Mode Operation 800

  Wireless Configuration Parameters 801

   SSID 802

   RF Channels 803

   Transmit Power 804

   Data Rates 804

   Power-Save Mode 805

   RTS/CTS 806

   Fragmentation 808

   RTS/CTS and Fragmentation Summary 808

  Wireless Medium Access 809

  Wireless Security 810

   WEP 811

   TKIP 811

   AES 812

   WPA 812

   Open System Authentication 812

   Shared Key Authentication 812

   Virtual Private Networks 813

   Comparing Wireless Security 813

  RF Signal Concepts 814

   Modulation 814

   RF Signal Characteristics 815

   Gain 816

   Signal-to-Noise Ratio 816

   Spread Spectrum 817

   Orthogonal Frequency Division Multiplexing 818

   FCC Rules 819 RF Interference 819 Multipath 820

 Foundation Summary 822

  Memory Builders 822

   Definitions 823

   Further Reading 823

Chapter 23 Wireless LAN Solutions 825

 “Do I Know This Already?” Quiz 825

 Foundation Topics 828

  Cisco Structured Wireless-Aware Network 828

   Wireless Domain Services 828

   Intrusion Detection System 829

   Cisco SWAN Hardware 831

   Cisco Wireless LAN Hardware 832

   CiscoWorks Wireless LAN Solution Engine 834

    Automatic Access Point Configuration 834

    Assisted Site Surveys 835

    Centralized Firmware Updates 835

    Dynamic Grouping 835

    VLAN Configuration 835

    Multiple Service Set Identifier Support 835

    Customizable Thresholds 835 Fault Status 836

    Intrusion Detection System 836

    Security Policy Monitoring 836

    Secure User Interface 836

    Air/RF Scanning and Monitoring 836

    Self-Healing Functions 837

    Reporting, Trending, Planning, and Troubleshooting 837

  Applying Wireless LANs in Enterprises 837

   Enterprise Security 837

   Voice Services 839

  Public Wireless LANs 840

  Small Office and Home Wireless LANs 842

 Foundation Summary 845

  Memory Builders 845

   Fill in Key Tables from Memory 845

   Definitions 845

   Further Reading 845

Part IX OSI and Cisco Device Basics 847

Chapter 24 Miscellaneous Networking Theory and Practices 849

 “Do I Know This Already?” Quiz 849

 Foundation Topics 851

  The OSI and TCP/IP Models 851

   OSI Layers 851

   OSI Layering Concepts and Benefits 854

   OSI Terminology 855

   OSI Layer Interactions 856

  Router Operation Miscellany 858

   Cisco IOS Software Boot Sequences and the Configuration Register 858

    The Configuration Register 858

    The boot system Command 859

   CLI Help Features 860

 Foundation Summary 862

  Memory Builders 863

   Fill in Key Tables from Memory 863

   Definitions 863

Part X Appendixes 865

Appendix A Answers to the “Do I Know This Already?” Quizzes 867

Appendix B CCIE Routing and Switching Exam Updates: Version 1.0 891

Appendix C MPLS 895

Appendix D Decimal to Binary Conversion Table 953

Index 958