Accessing The WAN

3y ago
78 Views
7 Downloads
1.52 MB
93 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Braxton Mach
Transcription

Accessing the WANCCNA Exploration Companion GuideBob VachonRick GrazianiCisco Press800 East 96th StreetIndianapolis, Indiana 46240 USA

iiAccessing the WAN, CCNA Exploration Companion GuideAccessing the WAN,CCNA Exploration Companion GuideBob Vachon, Rick GrazianiCopyright 2008 Cisco Systems, Inc.Published by:Cisco Press800 East 96th StreetIndianapolis, IN 46240 USAAll rights reserved. No part of this book may be reproduced or transmitted in any form or byany means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for theinclusion of brief quotations in a review.PublisherPaul BogerAssociate PublisherDave DusthimerCisco RepresentativeAnthony WolfendenCisco Press ProgramManagerJeff BradyExecutive EditorMary Beth RayProduction ManagerPatrick KanousePrinted in the United States of AmericaSecond Printing January 2013Library of Congress Cataloging-in-Publication Data is on file.ISBN-13: 978-1-58713-349-7ISBN-10: 1-58713-349-0Senior DevelopmentEditorChristopher ClevelandSenior Project EditorSan Dee PhillipsCopy EditorGayle JohnsonTechnical EditorsNolan FretzCharles HannonSnezhy NeshkovaMatt SwinfordEditorial AssistantVanessa EvansBook and CoverDesignerLouisa AdairCompositionMark ShirarIndexerTim WrightProofreaderKathy Ruiz

iiiTrademark AcknowledgmentsAll terms mentioned in this book that are known to betrademarks or service marks have been appropriately capitalized. Cisco Press or Cisco Systems, Inc. cannot attest tothe accuracy of this information. Use of a term in this bookshould not be regarded as affecting the validity of anytrademark or service mark.Warning and DisclaimerThis book is designed to provide information about theAccessing the WAN course of the Cisco NetworkingAcademy CCNA Exploration curriculum. Every effort hasbeen made to make this book as complete and accurate aspossible, but no warranty or fitness is implied.The information is provided on an “as is” basis. Theauthors, Cisco Press, and Cisco Systems, Inc. shall haveneither liability nor responsibility to any person or entitywith respect to any loss or damages arising from the information contained in this book or from the use of the discsor programs that may accompany it.The opinions expressed in this book belong to the authorsand are not necessarily those of Cisco Systems, Inc.Corporate andGovernment SalesThe publisher offers excellent discounts on this book whenordered in quantity for bulk purchases or special sales,which may include electronic versions and/or custom covers and content particular to your business, training goals,marketing focus, and branding interests. For more information, please contact:U.S. Corporate and Government or sales outside the United States please contact:International Salesinternational@pearsoned.comFeedback InformationAt Cisco Press, our goal is to create in-depth technicalbooks of the highest quality and value. Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members of theprofessional technical community.Reader feedback is a natural continuation of this process. Ifyou have any comments about how we could improve thequality of this book, or otherwise alter it to better suit yourneeds, you can contact us through e-mail at feedback@ciscopress.com. Please be sure to include the book title andISBN in your message.We greatly appreciate your assistance.

ivAccessing the WAN, CCNA Exploration Companion GuideAbout the AuthorsBob Vachon is the coordinator of the Computer Systems Technology program at CambrianCollege in Sudbury, Ontario, Canada, where he teaches networking infrastructure courses.He has worked and taught in the computer networking and information technology fieldsince 1984. He is a scholar graduate of Cambrian College, and he received the prestigiousTeaching Excellence Award in 1997. Vachon has been a Cisco Networking Academyinstructor since 1999 and has been CCNP certified since 2002. He has worked with Ciscoas team lead, author, CCNP certification assessment developer, and subject matter expert ona variety of projects, including CCNA, CCNP, and global partner training courses. Heenjoys playing the guitar and being outdoors, either working in his gardens or white-watercanoe tripping.Rick Graziani teaches computer science and computer networking courses at CabrilloCollege in Aptos, California. He has worked and taught in the computer networking andinformation technology fields for almost 30 years. Before that, he worked in IT for variouscompanies, including Santa Cruz Operation, Tandem Computers, and Lockheed Missilesand Space Corporation. He holds an M.A. in computer science and systems theory fromCalifornia State University Monterey Bay. Graziani also does consulting work for Cisco andother companies. When he is not working, he is most likely surfing. He is an avid surferwho enjoys longboarding at his favorite Santa Cruz surf breaks.

vAbout the Technical ReviewersNolan Fretz is a college professor in network and telecommunications engineering technology at Okanagan College in Kelowna, British Columbia. He has almost 20 years of experience in implementing and maintaining IP networks and has been sharing his experiences byeducating students in computer networking for the past nine years. He holds a master’sdegree in information technology.Charles Hannon is an assistant professor of network design and administration atSouthwestern Illinois College. He has been a Cisco Certified Academy instructor since1998. He has a master of arts degree in education from Maryville University in St. Louis.He holds a valid CCNA certification and has eight years of experience in managing information systems. His priority is to empower students to become successful and compassionate lifelong learners.Snezhy Neshkova, CCIE No. 11931, is a technical manager with the Cisco NetworkingAcademy. She has more than 20 years of networking experience including field servicesand support, management, and networking education. She has developed and taught a number of different courses in the networking field including Cisco Networking Academy curricula. Snezhy holds a master of science degree in computer science from the TechnicalUniversity of Sofia, Bulgaria.Matt Swinford, associate professor of network design and administration at SouthwesternIllinois College, has been an active Cisco Certified Academy instructor since 1999. He isdedicated to fostering a learning environment that produces certified students and quality ITprofessionals. He has a master of business administration degree from Southern IllinoisUniversity at Edwardsville and holds valid CCNP, A , and Microsoft certifications.

viAccessing the WAN, CCNA Exploration Companion GuideDedicationsFor my wife, Teri. Without your patience and understanding, I would not have been able toparticipate in this project. Thank you for your love and support throughout the countless hoursit took me to complete this book and for your understanding that I still needed time to surf.—Rick GrazianiTo my wife, Judy, who, through good times and hard times, helped me keep body and soultogether. Without her support and encouragement, I would not have been involved with thisproject.—Bob Vachon

viiAcknowledgmentsFrom Rick Graziani:First of all, I want to thank my good friend Bob Vachon for the pleasure of writing thisbook with him. Bob’s expertise with and commitment to the Cisco Networking Academyhave always been extraordinary. His work in the creation of this book has been anotherexample of his exceptional talents.This book was not the work of any one or two individuals but literally was a team effort.Jeremy Creech headed a team that included Gail Behrend, Koksal Cengiz, Don Chipman,Sonya Coker, Allan Johnson, David Kotfila, Jeff Luman, Bob Vachon, Alan Weiler, and me.My sincere gratitude and thanks to Jeremy and the team for letting me be part of such an outstanding team. I am honored and humbled to work with such a fine group of dedicated people.Special thanks to Mary Beth Ray for her patience and understanding throughout this longprocess. Mary Beth always provided that voice of calm reassurance and guidance wheneverneeded.Thank you, Chris Cleveland, for your help in the editing and production stages. I amamazed at the level of cooperation and teamwork required to produce a technical book, andI am grateful for all your help.Thanks to all the technical editors for providing feedback and suggestions. Nolan Fretz,Charles Hannon, Snezhy Neshkova, and Matt Swinford did more than just technical editing;they helped take these topics and made sure that they were understandable and accurate.Finally, I want to thank all my students over the years. For some reason, I always get thebest students. You make my job fun and are the reason why I love teaching.From Bob Vachon:I would first like to thank Rick Graziani for providing guidance and assistance when I needed it most. They say you can measure a man by the amount of respect he gets. Rick, youare a giant. Thank you. It has been a pleasure writing this book with you.I would also like to thank my friends Jeremy Creech and John Behrens of Cisco for theircontinued support and for asking me to be part of a great development team. My sinceregratitude to the entire development team for their outstanding contribution. I am honored towork with such a fine group of dedicated people.Special thanks to the folks at Cisco Press. A big thank-you goes to Mary Beth Ray for providing me the opportunity to be part of this project and to Chris Cleveland for your editinginsight and patience. Thanks to the technical editors for providing a fresh set of eyes whenreviewing the book.A great big thanks to the folks at Cambrian College—specifically, Liz Moratz, GeoffDalton, Sonia Del Missier, and Sylvia Barnard for your encouragement and support. Iwould also like to thank Betty Freelandt for providing me with the opportunity to discoverthe Cisco Networking Academy.Finally, thanks to all my students. You’re the reason why we’re here. I learn so much fromyou, and you make me thankful for having the best job in the world!

viiiAccessing the WAN, CCNA Exploration Companion GuideContents at a GlanceChapter 1Introduction to WANsChapter 2PPPChapter 3Frame RelayChapter 4Network SecurityChapter 5ACLsChapter 6Teleworker ServicesChapter 7IP Addressing ServicesCHapter 8Network 7189309377429525

ixContentsChapter 1Introduction to WANsObjectives1Key Terms11Introducing Wide-Area Networks (WANs)What Is a WAN?3Why Are WANs Necessary?The Evolving Enterprise55Businesses and Their NetworksSmall Office (Single LAN)Campus (Multiple LANs)Branch (WAN)5668Distributed (Global)9The Evolving Network Model11The Hierarchical Design Model11The Enterprise Architecture 13WAN Technology Concepts17WAN Technology Overview 17WAN Physical Layer Concepts18WAN Data Link Layer ConceptsWAN Switching ConceptsWAN Connection Options232629WAN Link Connection Options29Dedicated Connection Link Options31Circuit-Switched Connection Options32Packet-Switched Connection Options35Internet Connection Options38Choosing a WAN Link ConnectionSummaryLabs444849Check Your Understanding50Challenge Questions and Activities543

xAccessing the WAN, CCNA Exploration Companion GuideChapter 2PPP55Objectives55Key Terms55Introducing Serial Communications56How Does Serial Communication Work?Serial Communication StandardsTDM565961Demarcation Point66Data Terminal Equipment and Data Communications EquipmentHDLC Encapsulation72Configuring HDLC EncapsulationTroubleshooting Serial InterfacesPPP Concepts757683Introducing PPP83PPP Layered Architecture 84PPP Frame Structure 87Establishing a PPP Session88Establishing a Link with LCPNCP Explained8995PPP Configuration Options97PPP Configuration Commands98Verifying a Serial PPP Encapsulation ConfigurationTroubleshooting PPP EncapsulationPPP Authentication Protocols101102108Password Authentication Protocol109Challenge Handshake Authentication Protocol (CHAP)PPP Encapsulation and Authentication ProcessConfiguring PPP with Authentication110112115Troubleshooting a PPP Configuration with AuthenticationSummaryLabs120120Check Your Understanding122Challenge Questions and Activities12611867

xiChapter 3Frame Relay127Objectives127Key Terms127Introduction128Basic Frame Relay ConceptsIntroducing Frame RelayVirtual Circuits128128134Frame Relay EncapsulationFrame Relay Topologies140141Frame Relay Address MappingConfiguring Frame Relay145152Enabling Frame Relay Encapsulation153Configuring Static Frame Relay MapsAdvanced Frame Relay ConceptsSolving Reachability Issues159Frame Relay Subinterfaces161Paying for Frame Relay156159162Frame Relay Flow Control166Configuring Advanced Frame Relay168Configuring Frame Relay SubinterfacesVerifying Frame Relay Operation168171Troubleshooting Frame Relay ConfigurationSummaryLabs180181Check Your Understanding182Challenge Questions and ActivitiesTo Learn MoreChapter 4188188Network SecurityObjectives189Key Terms189189Introduction to Network Security190Why Is Network Security Important?Common Security Threats199Types of Network Attacks206190178

xiiAccessing the WAN, CCNA Exploration Companion GuideGeneral Mitigation TechniquesThe Network Security Wheel219226The Enterprise Security PolicySecuring Cisco Routers232Router Security Issues232229Applying Cisco IOS Security Features to Routers 235Securing Router Network Services250Vulnerable Router Services and InterfacesSecuring Routing Protocols250256Locking Down Your Router with Cisco AutoSecure 263Using Cisco SDM264Cisco SDM Overview 264Configuring Your Router to Support SDMStarting SDM265267The SDM InterfaceCisco SDM Wizards269272Locking Down a Router with SDMSecure Router Management272275Maintaining Cisco IOS Software ImagesManaging Cisco IOS Images276Managing Cisco IOS Images283275Backing Up and Upgrading a Software Image 284Recovering Software Images288Troubleshooting Cisco IOS ConfigurationsRecovering a Lost PasswordSummaryLabs297301301Check Your Understanding302Challenge Questions and ActivitiesChapter 5ACLs309Objectives309Key Terms309308294

xiiiUsing ACLs to Secure NetworksA TCP ConversationPacket Filtering310313What Is an ACL?ACL Operation310316318Types of Cisco ACLs322How a Standard ACL Works323Numbering and Naming ACLsWhere to Place ACLs323324General Guidelines for Creating ACLsConfiguring Standard ACLs327327Entering Criteria Statements327Configuring a Standard ACL 328ACL Wildcard Masking332Applying Standard ACLs to InterfacesEditing Numbered ACLs343Creating Standard Named ACLs345Monitoring and Verifying ACLs346Editing Named ACLs347Configuring an Extended ACLExtended ACLs339348349Configuring Extended ACLs351Applying Extended ACLs to the InterfacesCreating Named Extended ACLsConfigure Complex ACLs357What Are Complex ACLs?Dynamic ACLs358Reflexive ACLs360Time-Based ACLs355357363Troubleshooting Common ACL Errors 364SummaryLabs368368Check Your Understanding369Challenge Questions and Activities375353

xivAccessing the WAN, CCNA Exploration Companion GuideChapter 6Teleworker ServicesObjectives377Key Terms377377Business Requirements for Teleworker Services379The Business Requirements for Teleworker ServicesThe Teleworker SolutionBroadband Services380384Connecting Teleworkers to the WAN 384CableDSL385391Broadband WirelessVPN Technology396401VPNs and Their BenefitsTypes of VPNs402405VPN Components407Characteristics of Secure VPNsVPN Tunneling408409VPN Data Confidentiality and IntegrityIPsec Security ProtocolsSummaryLabs416419419Check Your Understanding419Challenge Questions and ActivitiesChapter 7IP Addressing ServicesObjectives429Key Terms429IntroductionDHCP429431431Introduction to DHCPDHCP OperationBOOTP and DHCP432432435423410379

xvConfiguring a Cisco Router as a DHCP ServerConfiguring a DHCP ClientDHCP Relay440447449Configuring a DHCP Server Using SDMTroubleshooting DHCP ConfigurationScaling Networks with NATWhat Is NAT?453456460462Benefits and Drawbacks of Using NAT 468Configuring Static NAT 470Configuring Dynamic NAT 471Configuring NAT Overload for a Single Public IP Address473Configuring NAT Overload for a Pool of Public IP AddressesConfiguring Port Forwarding477Verifying NAT and NAT Overload479Troubleshooting NAT and NAT Overload ConfigurationIPv6485Reasons for Using IPv6IPv6 Addressing489493IPv6 Transition StrategiesCisco IOS Dual StackIPv6 Tunneling499500502Routing Configurations with IPv6Configuring IPv6 Addresses506Configuring RIPng with IPv6SummaryLabs503508512512Check Your Understanding514Challenge Questions and Activities522483475

xviAccessing the WAN, CCNA Exploration Companion GuideChapter 8Network TroubleshootingObjectives525Key Terms525525Establishing the Network Performance Baseline526Documenting Your Network 526Network Documentation Process 533Why Is Establishing a Network Baseline Important? 535Steps for Establishing a Network Baseline 535Troubleshooting Methodologies and Tools541A General Approach to Troubleshooting 541Using Layered Models for Troubleshooting 541General Troubleshooting Procedures 544Troubleshooting Methods 545Gathering Symptoms 548Troubleshooting Tools 551Review of WAN Communications560WAN Communications 560Steps in WAN Design 561WAN Traffic Considerations 562WAN Topology Considerations 564WAN Connection Technologies 567WAN Bandwidth Considerations 568Common WAN Implementations Issues 569WAN Troubleshooting from an ISP’s Perspective 570Network Troubleshooting571Physical Layer Troubleshooting 573Data Link Layer Troubleshooting 577Network Layer Troubleshooting 584Transport Layer Troubleshooting 586Application Layer Troubleshooting 589

xviiSummaryLabs595595Check Your Understanding596Challenge Questions and ActivitiesAppendix601Glossary637Index655600

xviiiAccessing the WAN, CCNA Exploration Companion GuideIcons Used in This ess PointOptical TransportsWireless ConnectionMultilayerSwitchSwitchATM/FrameRelay SwitchCO SwitchHubEthernetConnectionCisco ASARouter withFirewallFirewall ServicesModuleFirewallSerial LineConnectionVPNConcentratorDSLAMNetwork CloudIP/TV BroadcastServerPIX FirewallVNetRangerAccessServerVoice-EnabledAccess ServerAnalogPhonePBX SwitchIPIP PhoneLaptopPrinterServerModemPCWeb ServerCommand Syntax ConventionsThe conventions used to present command syntax in this book are the same conventionsused in the IOS Command Reference. The Command Reference describes these conventions as follows: Bold indicates commands and keywords that are entered literally as shown. In actualconfiguration examples and output (not general command syntax), bold indicates commands that the user enters (such as a show command). Italic indicates arguments for which you supply actual values. Vertical bars ( ) separate alternative, mutually exclusive elements. Square brackets ([ ]) indicate an optional element. Braces ({ }) indicate a required choice. Braces within brackets ([{ }]) indicate a required choice within an optional element.

xixIntroductionThe Cisco Networking Academy is a comprehensive e-learning program that provides students with Internet technology skills. A Networking Academy delivers web-based content,online assessment, student performance tracking, and hands-on labs to prepare students forindustry-standard certifications. The CCNA curriculum includes four courses orientedaround the topics on the Cisco Certified Network Associate (CCNA) certification.Accessing the WAN, CCNA Exploration Companion Guide is the official supplement textbook to be used with version 4 of the CCNA Exploration Accessing the WAN online curriculum of the Networking Academy.This book goes beyond earlier editions of the Cisco Press Companion Guides by providingmany alternative explanations and examples as compared with the course. You can use

Nolan Fretzis a college professor in network and telecommunications engineering technol-ogy at Okanagan College in Kelowna, British Columbia. He has almost 20 years of experi-ence in implementing and maintaining IP networks and has been sharing his experiences by educating students in computer networking for the past nine years. He holds a .

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

tai wan, Bai feng wan, Cheng yun wan, Bu chang kang fu yan jiao nang, Kang ru xian zeng sheng zheng . 67 fang dan shen pian, Da huo luo dan, Tian ma mi huan pian, Dan shen di wan , An gong niu huang wan, Hua tuo zai zao wan, Ren shen zai zao wan, Jiu xin dan, Nao xin tong jiao nang, li xu wang ruan jiao nang, Niu huang qing xin wan, Shu he .

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

Our recommendations for configuring and placing your new SD-WAN device include: Review your IP addressing scheme to ensure SD-WAN appliance. Then, have your SD-WAN provider review your IP addressing scheme to determine proper placement of SD-WAN equipment into the network. Conduct proper inbound and outbound policy routing procedures.