IT Networking for Cisco: (CCNA 200-120, 640-554, 640-721)
4.1 (73 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,460 students enrolled
Wishlisted Wishlist

Please confirm that you want to add IT Networking for Cisco: (CCNA 200-120, 640-554, 640-721) to your Wishlist.

Add to Wishlist

IT Networking for Cisco: (CCNA 200-120, 640-554, 640-721)

Learn to manage & troubleshoot the fundamentals of Cisco network from the ground up: networking, security, and wireless.
4.1 (73 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,460 students enrolled
Created by LearnSmart LLC
Last updated 11/2015
English
English
Price: $120
30-Day Money-Back Guarantee
Includes:
  • 13.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Test your knowledge and skills. Prove to yourself, and others, that you are ready for the Cisco Certified Network Associate (200-120) certification exam.
  • You’ll demonstrate your proficiency in the principles, techniques, and tools involved in install, configure, operate, and troubleshoot networks.
  • Our courseware is based on the CCNA (Interconnecting Cisco Networking Devices: Accelerated), the ICND1, and IND2 exam​ objectives
  • Become familiar with the client side of a wireless connection and how the client should be configured for wireless LAN access, as well as, how to properly configure various wireless clients.
  • Learn the fundamental topics of a wireless network, including basic spread spectrum technology, the wireless regulatory bodies, and the impact of different wireless technologies.
  • Test your knowledge and skills. Prove to yourself, and others, that you are ready for the Cisco Security Exam (640-554 IINS) certification exam.
  • You will learn about basic network and information security principles, and will be able to define what AAA is and going over some of its design considerations.
  • ACLs mitigate threats against a network in a variety of ways; we will be covering some of these ways in this course. You will be able to define the management plane and identify practices that can be used to make it more secure.
  • Test your knowledge and skills. Prove to yourself, and others, that you are ready for the Cisco Wireless Exam (640-722 IUWNE) certification exam.
  • Download extra printable and saveable PPT Slides, flash cards, games, and other supplemental materials within each section in our course.
  • Apply your knowledge througout the course with quick quizzes and be fully prepared for the Cisco exam with our final exam!
  • Communicate with the instructor and openly ask questions that will be addressed within 48 hours.
  • Participate in active discussions with other students & participants becoming Cisco Certified.
View Curriculum
Requirements
  • No prerequisites for this course -A computer with internet.
Description

Welcome to IT Networking for Cisco: (CCNA 200-120, 640-554, 640-721) from LearnSmart.

Looking to become a Cisco Certified Network Associate and CCNA Certified in Routing & Switching, Security, Wireless?

This is the full Cisco training package that will prepare you to take the following exams: Cisco Exam 200-120? Cisco Exam 640-554? Cisco Exam 640-721?

By the end of the course you'll demonstrate your proficiency in the principles, techniques, and tools involved in install, configure, operate, and troubleshoot networks. Ultimately this training will establish your understanding of all the fundamental concepts within CCNA routing and switching, security, and wireless.

Course Overview:

These sections can be taken in any order, as a review of a particular concept or exam domain. However, if you are just becoming familiar with networking, security, and wireless, it is recommended that you view the courses sequentially.

In this course become familiar with the fundamental topics and skills required to install, operate, and troubleshoot a small to medium size enterprise branch network

Course Breakdown:

CCNA Routing & Switching (Section 1-10)
**Section 25: CCNA Routing and Switching: Test Me-Cisco 200-120 CCNA

Section 1: In the pre-assessment quiz you'll face questions from all sections of this training. Test your current knowledge and know your strengths and weaknesses.

Section 2: Understand the fundamentals of a network and learn about the operation of IP data networks, which will help administrators configure and troubleshoot issues moving forward.

Section 3: Review the topics of LAN switching, WAN technologies by taking a closer look at the particular variables of Ethernet, switching, broadcast and collision domains, and basic switching concepts.

Section 4: Take a look at both IPv4 and IPv6, and the role of IP addresses in network routing. Understand what subnetting and Variable Length Subnet Masks are.

Section 5: Study about system and network management, and discuss the fundamentals of how the router boot process works.

Section 6: Deepen your understanding of IP routing technologies and the fundamentals of how routing decisions are made within devices. Also focus on these particular routing protocols, EIGRP and OSPF, their fundamentals, and how to successfully configure each one.

Section 7: Concentrate on some IP services, and router and switch security. Learn about DHCP and how to configure it on a router.

Section 8: You will learn the skills to troubleshoot any router or switch issue. Walk through troubleshooting procedures and methodology. Explore how to troubleshoot IP addressing and switching problems, routing problems, as well as how to troubleshoot access control lists, WANs, and layer interface issues to enable efficient and secure network connectivity.

CCNA Security (640-554 IINS) (Section 9 - 10)
**Section 26: CCNA Security: Test Me-Cisco Exam CCNA Security 640-554 IINS

Section 9: In the pre-assessment quiz you'll face questions from all sections of this training. Test your current knowledge and know your strengths and weaknesses.

Section 10: Understand common security threats within a network and take a look at network and information security basics by learning some of the fundamental security principles. Learn how to secure the control, data and management planes on Cisco devices, including implementing security on Cisco routers.

Section 11: Take a look at the differences between TACACS and RADIUS by understanding what they offer as an authentication type, and how to configure each one. Review the examples of ways in which you can configure AAA, via the Command Line Interface and Cisco Configuration Professional, along with some verification commands.

Section 12: Access Control Lists (ACLs) help to mitigate threats against a network in a variety of ways. ACLs should be tested in a test environment prior to actually applying them and look at exactly what they are, what they do, and discuss the different types of ACLs and the role they play in security.

Section 13: Focus on securing the network management plane. Be able to define the management plane, and learn some best practices that can be used to make it more secure, such as strong passwords, AAA, Role Based Access Control, Syslog, and NTP. Then, you will learn to identify and study demonstrations of the different configurations that can be implemented on the management plane.

Section 14: Gain an in-depth understanding of these topics to determine how to best respond to layer 2 attacks.

Section 15: Cisco Firewall Technologies explains the different firewall technologies and the strengths and weaknesses that surround them.

Section 16: Cisco IPS discusses the differences between a Cisco IPS and Cisco IDS device, and some options that you have when deploying them in your network.

Section 17: Learn the basics of VPN technologies, and how IPSec works in a VPN tunnel setup. You will also look at the basics of cryptography in order to gain a better understanding of exactly what goes on behind the scenes of a VPN tunnel establishment. Finally, you will walk through different ways of implementing a site-to-site VPN and configured SSL VPN using the graphical device manager from an ASA.

CCNA Wireless (640-722 IUWNE)
(Section 18-24)
**Section 27: CCNA Wireless: Test Me-Cisco Exam CCNA Wireless 640-722 IUWNE

Section 18: In the pre-assessment quiz you'll face questions from all sections and topics of this training. Test your current knowledge and know your strengths and weaknesses.

Section 19: It's imperative for any network engineer to be familiar with the fundamental topics of a wireless network, including basic spread spectrum technology, the wireless regulatory bodies, and the impact of different wireless technologies.

Section 20: Installation of a Basic Cisco Wireless LAN discusses various best practices for Cisco Unified Wireless Network Architectures and provides demonstrations of installing and configuring autonomous access points, which operate on their own.

Section 21: Installation of Wireless Clients demonstrates the practical and theoretical basis from which you can effectively administer a wireless network.

Section 22: Basic WLAN Security provides a close up look at the implementation of security on the wireless network and some of the different aspects of wireless security.

Section 23: Basic WCS Operation demonstrates the configuration of access points and controllers in a WCS environment, how to audit them, and how to properly use heat maps for an environment in a wireless environment.

Section 24: Basic WLAN maintenance through the WCS and the WLC interface is critical knowledge that all network engineers must have.

*The content in this course aligns with from Cisco.

Recommendations:

Learn from others! Here are some reviews from the participants enrolled in this course (Click on reviews to see full list of reviews)

  • Smart method to learn - This course is helpful and using smart way to motivate thinking and understanding. The instructor has a professional delivery method, and the he materials are interesting and creative specially the flashcards and the exercises -- Ibrahim Alsayed
  • Great intro to CCNA - while this material can be pretty dry the instructor does a pretty good job of keeping the course interesting and informative. There is a lot of really good and easy to follow information. -- Sam Davidson
  • This CCNA course does an in depth coverage of the topics that you will need to know to pass the CCNA certification tests -- I highly recommend that anyone who wants to learn the material to take and pass the CCNA Exam, take this course. Those who master this course, will pass the exam on their first attempt. -- Bob Ziolkowski
Who is the target audience?
  • Professional who would like to prepare themselves for the Cisco Certified Network Associate (200-120), ICND1 (100-101), and/or the ICND2 (200-101) certification exams
  • Professional who would like to prepare themselves for the CCNA Security 640-554 IINS Certification Exam
  • Professional who would like to prepare themselves for the CCNA Wireless 640-722 IUWNE Certification Exam
Students Who Viewed This Course Also Viewed
Curriculum For This Course
401 Lectures
13:30:26
+
Orientation Video
1 Lecture 01:13

This lecture contains an orientation on how to find the supplemental materials.

Preview 01:13
+
Pre-Assessment: CCNA Routing & Switching
0 Lectures 00:00
Pre-Assessment: CCNA Routing & Switching (CCNA 200-120)
15 questions
+
Operation of IP Data Networks
12 Lectures 32:55

The operation of I-P data networks, will provide you with a fundamental, theoretical overview of a network. In order configure and troubleshoot issues moving forward, understanding the fundamentals of a network is crucial.

This lecture will introduce you to the concept of IP Data Networks and how they operate.

Topics Covered Include:
  • Objectives
Preview 01:46

An internetwork is a group of devices, such as a printer, server, or a computer, that are grouped together and communicate with each other across one single network or many interconnected networks.

This lecture will discuss the definition of an Internetwork and how it pertains to an IP Data Network.

Topics Covered Include:
  • Types of Networks
  • Definitions
Definition of an Internetwork
02:23

The Open Systems Interconnection Model, or OSI model is a theoretical model that relates to how data is transferred from one endpoint to another. There are seven layers, and each layer has an independent task in this process as well as specific protocols.

This lecture will discuss the operations within the OSI Model and how it works within an IP Data Network.

Topics Covered Include:
  • OSI Model
  • OSI Model
  • Port Numbers
  • TCP vs UDP
The OSI Model
09:16

The TCP/IP suite is the most popular set of communications protocols used today. It is used both on the internet and on most networks around the world. At one point in time, there were other protocol suites, but nothing was quite as popular as TCP/IP.

This lecture will discuss the TCP and IP communication protocols and how they are used within IP Data Networks.

Topics Covered Include:
  • TCP/IP
TCP/IP
01:20

This lecture will ask some sample questions.

Chapter 1 Knowledge Check
02:01

This lecture will take you through some of the key points covered throughout the first portion of this section. Upon Completion of this section you will be prepared to move on to the second portion.

Summary
00:49

A broadcast domain is the device that hears all of the traffic that is being broadcast across the network, while attempting to reach all users on particular network segments. A collision domain is a division within a broadcast domain in which frames from one networked device could potentially collide with each other.

This lecture will discuss the differences between Broadcast and Collision Domains.

Topics Covered Include:
  • Collision Domain vs. Broadcast Domain
Collision versus Broadcast Domain
01:10

This lecture will discuss the three different types of traffic within an IP Data Network, Unicast traffic; Multicast traffic, and Broadcast traffic.

Topics Covered Include:
  • Data Transmission
Data Transmission
00:40

There are numerous devices available that will transmit and receive network traffic. These devices include hubs, bridges, switches and routers. Some of these devices, such as a hub and a bridge, are not used as often as they used to be.

This lecture will discuss the network devices as well as how they are used.

Topics Covered Include:
  • Network Devices
Network Devices
05:02

Networks utilize different media types in order to transport data. The most predominant media type used is twisted pair copper cables. This type of cable is used for cabling in telephones and most Ethernet communications.

This lecture will discuss the Network Media Types and how they are used within IP Data Networks.

Topics Covered Include:
  • Network Media Types
  • Coaxial Types
Network Media Types
06:14

This lecture will ask some sample questions.

Chapter 2 Knowledge Check
01:09

This lecture will take you through some of the key points covered throughout the second portion of this section. Upon Completion of this section you will be prepared to move on to the next Section: LAN Switching and WAN Technologies.

Summary
01:05

Section Quiz
5 questions
+
LAN Switching and WAN Technologies
31 Lectures 01:16:55

This course will focus on the topics of LAN Switching and WAN Technologies. We'll look at the fundamentals of a network, particular variables Ethernets, switching, broadcasts and collision domains, and basic switching concepts.

This lecture will introduce you to LAN Switching and WAN Technologies and the concepts within it.

Topics Covered Include:
  • Objectives
Preview 00:30

Ethernet is an 802.3 (IEEE Standard), it is commonly used today and in order to use it a basic understanding of its fundamental is required. First, understanding that the frame contains the source and destination of the MAC address.

This lecture will discuss the meaning of the Ethernet and the importance of understanding its concepts.

Topics Covered Include:
  • Ethernet
  • SCMA/CD
Ethernet
07:12

There are two types of switching, packet and circuit switching. Packet Switching is when data is divided into packets and transmitted individually. Circuit Switching has a dedicated line allocated for transmission.

This lecture will discuss the different types of switching and what each of them mean.

Topics Covered Include:
  • Types of Switching
Types of Switching
02:04

The system memory of a switch constructs a table to reference MAC Addresses for all incoming frames. When there is a match it goes out that port; however, there are times when it does not have a match.

This lecture will discuss what the CAM table is used for and what it does.

Topics Covered Include:
  • CAM Table
CAM Table
01:20

This lecture will ask some sample questions.

Chapter 1 Knowledge Check
01:23

This lecture will take you through some of the key points covered throughout the first portion of this section. Upon Completion of this section you will be prepared to move on to the second portion.

Summary
00:22

This chapter will cover some very important concepts involved our layer 2 switching. Here is where we'll cover the definition and fundamentals of VLANs or Virtual Local Area Networks, trunking, and etherchannels.

This lecture will introduce you to VLANs and the components within it.

Topics Covered Include:
  • Objectives
Preview 00:20

A Virtual Local Area Network or VLAN is a way to logically segment networks into separate broadcast demands. This is a very important fact to remember, it is logical not physical. An administrator defines a number of switchboards that will be associated to a VLAN.

This lecture will discuss the ways a VLAN is defined and configured.

Topics Covered Include:
  • Define/Configure VLANs
  • Configure VLANs
  • Demonstration
Defining and Configuring V-LANs
04:39

VLAN Trunking Protocol (VTP) when configured on a switch will advertise its configuration information to neighboring switches, the ability enables all other switches in the network to learn the VLAN information dynamically.

This lecture will discuss the VLAN Trunking Protocol and what it is used for.

Topics Covered Include:
  • VLAN Trunking Protocol (VTP)
  • VTP Modes
  • VTP Settings
  • Demonstration
V-LAN Trunking Protocol (VTP)
05:40

Trunking enable a switch router to send traffic to multiple VLANs across a link. The VLAN number is placed inside the Ethernet frame in order to identify which VLAN it belongs to when it traverses the trunk link. This referenced as a VLAN tag.

This lecture will discuss the uses of Trunking for VLANs and how to use them.

Topics Covered Include:
  • VLAN Trunking
  • Demonstration
V-LAN Trunking
04:52

Etherchannel is the ability to bundle multiple Ethernet links together to act as a single physical link. Fiber links are also capable of using Etherchannel, this is a huge advantage, especially in data centers or links to other switches.

This lecture will discuss the uses of Etherchannel and it different types.

Topics Covered Include:
  • Etherchannel
  • Etherchannel Types
  • Demonstration
Etherchannel
03:07

This lecture will ask some sample questions.

Chapter 2 Knowledge Check
01:09

This lecture will take you through some of the key points covered throughout the second portion of this section. Upon Completion of this section you will be prepared to move on to the third portion.

Summary
00:24

Let's dive into Spanning Tree Protocol and discuss some basic fundamentals and configuration. We will also take some time to cover RSTP and MSTP, which are more advanced spanning tree topics and built upon STP's base.

This lecture will introduce you to the Spanning Tree Protocol and its components.

Topics Covered Include:
  • Spanning Tree Topology
  • STP Timers
  • Demonstration
Spanning Tree Protocol (STP) - 802.1d
09:25

Because 802.1d STP is so slow, there was a push to improve spanning tree as a protocol as a whole. Rapid spanning tree, 802.1W, was developed in response to the inherent slowness, and included some other overall improvements in the protocol.

This lecture will discuss the inner workings of RSTP and why it was created.

Topics Covered Include:
  • New Port Types in (RSTP) 802.1w
  • New Port States in (RSTP) 802.1w
  • Multiple Spanning Tree (MST) 802.1s
  • Demonstration
Rapid Spanning Tree (RSTP) - 802.1w
03:41

This lecture will ask some sample questions.

Chapter 3 Knowledge Check
00:52

This lecture will take you through some of the key points covered throughout the third portion of this section. Upon Completion of this section you will be prepared to move on to the fourth portion.

Summary
00:26

In this next chapter, we will talk about WAN in depth. Wide Area Networks are very important when it comes to larger networks that span large geographical regions, whether it be the internet or an enterprise.

This lecture will introduce you to Connection Technologies and its components.

Topics Covered Include:
  • Wide Area Network (WAN)
Preview 01:17

There are multiple connection technologies. Leased lines are a point-to-point connection between two endpoints. These are generally very expensive because they are dedicated links for these two endpoints.

This lecture will discuss the different types of connection technologies and what they do.

Topics Covered Include:
  • Connection Technologies
Connection Technologies
04:12

This lecture will ask some sample questions.

Chapter 4 Knowledge Check
00:42

This lecture will take you through some of the key points covered throughout the fourth portion of this section. Upon Completion of this section you will be prepared to move on to the fifth portion.

Summary
00:22

This chapter will focus on how to configure WANs. First, we will configure a basic WAN serial connection. Then we will set up a basic point-to-point protocol, or P-P-P connection between two Cisco routers, and then look at configuring frame relay on Cisco routers.

This lecture will introduce you to configuring WANs and the components within.

Topics Covered Include:
  • WAN Serial Connections
  • WAN Serial Connection
  • Verification
  • Demonstration
Basic Serial Connections
05:33

PPP can be configured quite easily, and there are authentication tools that can be used to make sure the link is secure. Password authentication protocol, or PAP (pap), can be used between the links, so can challenge handshake authentication protocol, or CHAP (chap).

This lecture will discuss the ways of configuring the Point to Point Protocol.

Topics Covered Include:
  • PPP
  • Configuring PPP
  • Verifying PPP
  • Demonstration
Point to Point Protocol (PPP)
04:55

With frame relay, you have another option to configure. Routers locally are DTE and LMI message, and keepalives are sent to setup and maintain the link called a virtual circuit with the remote router, which is usually a Telco.

This lecture will discuss what a frame relay is and the components within it.

Topics Covered Include:
  • Frame Relay
  • Configuring Frame Relay
  • Demonstration
Frame Relay
04:55

This lecture will ask some sample questions.

Chapter 5 Knowledge Check
01:13

This lecture will take you through some of the key points covered throughout the fifth portion of this section. Upon Completion of this section you will be prepared to move on to the sixth portion.

Summary
00:19

In this last chapter, we will talk about PPP over Ethernet, or simply called PPPOE, including a basic description of PPPOE and how to implement and troubleshoot it. PPP over Ethernet creates a PPP encapsulated tunnel over Ethernet.

This lecture will introduce you to PPPoE and the components within it.

Topics Covered Include:
  • Objectives
  • PPPoE
Preview 00:53

There are several configuration steps in creating a PPPoE tunnel. You must first define the dialer interface, which is simply a virtual interface. You can set up PPP encapsulation and discuss with the ISP on how you want to work an IP address scheme.

This lecture will discuss the ways of configuring PPPoE and how it is used.

Topics Covered Include:
  • Configuring PPPoE
Configuring PPPoE
01:09

In verifying and troubleshooting PPPoE, a few commands are helpful. “Show running-config” and “show IP interface brief” will help you identify link status, along with configuration information.

This lecture will discuss the ways of verifying and troubleshooting PPPoE.

Topics Covered Include:
  • Troubleshooting PPPoE
  • Demonstration
Troubleshooting PPPoE
02:34

This lecture will ask some sample questions.

Chapter 6 Knowledge Check
01:04

This lecture will take you through some of the key points covered throughout the sixth portion of this section. Upon Completion of this section you will be prepared to move on to the next Section: IPv4 and IPv6.

Summary
00:21

Section Quiz
5 questions
+
IPv4 and IPv6
18 Lectures 30:49

In this course, we will review the types of classes in both IPv4 and IPv6. We'll take a look at subnetting and Variable Length Subnet Masks, or VLSM. Finally, we will look at the structure of the IPv6 address, define several types of IPv6 addresses, and then configure an IPv6 address.

This lecture will introduce you to IPv4 and IPv6 and the components within them.

Topics Covered Include:
  • Introduction
  • Course Objectives
Preview 00:37

Internet protocol, or IP, defines the logical network layer address that will identify a host or a router interface that connects to a TCP/IP network. Think of an IP address like a mailing address for a data network.

This lecture will discuss the inner workings of IP Addresses and what they do.

Topics Covered Include:
  • IP Address
  • IP Addresses
IP Addresses
01:28

There are 5 network classes, splitting up the network availability for each class. Since the first octet, like all of them, adds up to 255, we will look at how they split up. A Class A network's first octet range is 1 through 126.

This lecture will discuss the different Classful Networks and how they are divided.

Topics Covered Include:
  • Classful Networks
  • Network Address
Classful Networks
04:01

IPv4 would have eventually run out if a solution wasn't found to eliminate the waste. One of the solutions was to subnet normal classful networks. Subnetting breaks down a Class A, Class B or Class C network even further to accommodate the number of IP addresses needed for each request.

This lecture will discuss the ways of subnetting the IP Addresses.

Topics Covered Include:
  • Subnetting
Subnetting
01:26

Once a company gets a publically routable IP address, or their own internal IP addressing scheme, it's time to develop a subnet plan to further break down the ranges for better use. This is called Variable Length Subnet Masking, or VLSM.

This lecture will discuss the necessity for an organization to obtain an IP Address and how it is used.

Topics Covered Include:
  • VLSM
  • VLSM
  • Best Practices
Variable Length Subnet Mask
02:00

This lecture will ask some sample questions.

Chapter 1 Knowledge Check
01:37

This lecture will take you through some of the key points covered throughout the first portion of this section. Upon Completion of this section you will be prepared to move on to the second portion.

Summary
00:30

IPv6 is becoming more popular, simply because there aren't any new addresses available to give out. Now, don't panic -- IPv4 is not going away entirely. It may down the road, but for right now, we will continue to use it.

This lecture will introduce you to IPv6 and the components within it.

Topics Covered Include:
  • Introduction
  • Objectives
Preview 00:57

IPv6 is meant to be a replacement for IPv4. IPv6 is a 128 bit address, compared to IPv4's 32 bit address. There is significantly more address availability for IPv6. IPv6 has approximately 3.4×1038 usable addresses, or more than 7.9×1028 times as many as IPv4.

This lecture will discuss the basics of IPv6 and how it is used.

Topics Covered Include:
  • Overview of IPv6
  • Impacted Variables
  • IPv6 Address
Overview of IPv6
03:25

Addressing for IPv6 uses hexadecimal, 8 sets of 4 hex digits to be exact. Each set is separated by a colon, instead of a period like in IPv4. IPv6 came out with the option of abbreviating the addresses to make it easier to read.

This lecture will discuss the concept of addressing within IPv6.

Topics Covered Include:
  • IPv6 Addressing
  • Determining Network and Host Portions
Addressing
04:09

IPv6 also has types of addresses, just like IPv4. They are referred to as Global Unicast and Unique Local. Subnetting can still be done within these types of addresses, but we'll discuss that a little later.

This lecture will discuss the global unicast address, and what it does.

Topics Covered Include:
  • Global Unicast
  • Example
Global Unicast Address
01:32

Unique Local Unicast addresses act as private IPv6 addresses, just like IPv4 has a group of private addresses. They do have similarities to Global Unicast in how to subnet, but they are not registered with IANA, and they can be used internally.

This lecture will discuss the unique local unicast address, and what it does.

Topics Covered Include:
  • Unique Local Unicast
  • Creating a Unique Local Unicast Address
Unique Local Unicast Address
01:08

Link-local addresses are not used for normal traffic. They are used for protocols to communicate with each other and for routing purposes. Packets that are sent to a link-local address do not leave the subnet. Each IPv6 host has a link-local address, in addition to the other IPv6 addresses.

This lecture will discuss the link local address, and what it does.

Topics Covered Include:
  • Link-Local Addresses
Link Local Address
01:46

EUI-64 stands for Extended Unique Identifier, which is an option to create and configure a stable and predictable IPv6 interface address. The MAC (mack) address is a part of this interface ID, and is easily recognizable because there is an FFFE hex group added to the address.

This lecture will discuss the EUI-64, and what it does.

Topics Covered Include:
  • EUI-64
  • Example
EUI-64
01:22

Route Solicitation messages ask routers to identify themselves. Route Advertisement messages are facts sent about the router, such as their link local address. There are also Neighbor Solicitation and Advertisement messages, which act like ARP requests by listing MAC (mack) addresses.

This lecture will discuss the Auto-Configuration, and what it does.

Topics Covered Include:
  • Auto-Configuration
Auto-Configuration
00:57

Multicasting is better than broadcasting due to the fact that we do not want to flood traffic out to hosts that need it. Instead, we want to send a single, targeted message from one source to multiple destinations.

This lecture will discuss the Multicast, and what it does.

Topics Covered Include:
  • Important Multicast Addresses
  • Demonstration
Multicast
02:24

This lecture will ask some sample questions.

Chapter 2 Knowledge Check
00:54

This lecture will take you through some of the key points covered throughout the second portion of this section. Upon Completion of this section you will be prepared to move on to the next Section: System and Network Management.

Summary
00:36

Section Quiz
5 questions
+
System and Network Managment
24 Lectures 41:30

In this course, we'll talk about system and network management and discuss the fundamentals of how the router boot process works. But first, we are going take a look at how an IOS (EYE-OSE) device boots up, as well as the boot loader and operating system that is on these devices.

This lecture will introduce you to Router Startup.

Topics Covered Include:
  • Introduction
Preview 00:52

Similar to a desktop or laptop computer, all Cisco routers and switches go through the Power on Self-Test. This ensures all hardware components are detected and that they are in working order.

This lecture will discuss the router boot process, and what it is used for.

Topics Covered Include:
  • Power on Self-Test (POST)
  • POST Process
Router Boot Process
02:49

IOS (EYE-OSE) is the operating system that a Cisco router or switch uses for operation. The IOS (EYE-OSE) can be loaded into flash, and you have the ability to tell the router to boot from there in order to gain access to that operating system.

This lecture will discuss the Cisco IOS Images, and what they do.

Topics Covered Include:
  • Cisco IOS Images
  • IOS Configuration Commands
Cisco IOS Images
03:21

The configuration register is used by routers to find configuration settings at boot time. This occurs right before the router loads both the IOS (EYE-OSE) and the startup-configuration file. This command can be changed in case you choose to boot into Rom-Monitor.

This lecture will discuss configuration register, and what it does.

Topics Covered Include:
  • Configuration Register
  • Demonstration
Configuration Register
03:52

There are several different configuration files that you need to be familiar with. The startup-configuration file is the initial configuration of the device and is stored in NVRAM. Startup-configuration will be loaded into RAM (ram) when the device first boots up.

This lecture will discuss the configuration files, and what they will be used for.

Topics Covered Include:
  • Configuration Files
Configuration Files
02:27

This lecture will ask some sample questions.

Chapter 1 Knowledge Check
00:58

Now, let's take a look at some basic router and switch management skills. We'll start by reviewing the setup mode process we talked about previously and what setup mode actually asks you to do.

This lecture will introduce you to basic router and switch management.

Topics Covered Include:
  • Introduction
Preview 00:33

When a router or a switch boots for the first time, the startup configuration is empty. The Setup mode will then prompt you to enter the configuration. You will be asked a series of questions that the IOS (EYE-OSE) will guide you through to give your device a basic configuration.

This lecture will discuss the initial setup for router and switch management.

Topics Covered Include:
  • Initial Setup
Initial Setup
00:54

There are two types of modes on a device. The first mode is called user EXEC mode. User EXEC mode is what you will see when you receive your first prompt on a device. Here, you can view basic items, with some show commands.

This lecture will discuss the mode on a device, and how to manage the routers and switches within them.

Topics Covered Include:
  • Device Modes
Device Modes
01:05

To shorten your keystrokes when typing in a command, you can hit the tab key to finish the command. For example, if you type 'config t' and hit tab, it will complete the word with terminal. This will not work if there is no command to reference or if there is more than one option for 't'.

This lecture will discuss the IOS Commands, and how they are used.

Topics Covered Include:
  • IOS Commands
  • Demonstration
IOS Commands
04:46

The first type of access is called console access. This local access is through a console cable that connects physically to a specific port labeled on your device. Every new device provided by Cisco ships with a console cable.

This lecture will discuss the access within devices, and how they are used.

Topics Covered Include:
  • Device Access
  • Demonstration
Device Access
03:20

Ping is an ICMP protocol, and uses ICMP messages for requests and replies. You can ping the device by its name or the IP address of the destination. You can send echo requests as well, with the default being 5 on Cisco devices.

This lecture will discuss testing connectivity, and what the results are use for.

Topics Covered Include:
  • Ping
  • Traceroute
  • Telnet and SSH
Testing Connectivity
02:11

This lecture will ask some sample questions.

Chapter 2 Knowledge Check
01:08

This lecture will take you through some of the key points covered throughout the second portion of this section. Upon Completion of this section you will be prepared to move on to the third portion.

Summary
00:27

Now, let's dive into some basic network management tools, using protocols like Syslog and SNMP. This is very important for many engineers, especially during troubleshooting. It's imperative to know how to configure this correctly so you can see information properly from your devices.

This lecture will introduce you to Basic Network management.

Topics Covered Include:
  • Introduction
Preview 00:25

Cisco devices monitor and report on many events that occur throughout a time period. They range from very important to very irrelevant, depending on your task. You can see these messages in real time via the output.

This lecture will discuss Syslog, and what it is used for.

Topics Covered Include:
  • Syslog
Syslog
02:07

SNMP is communications in which you define, between a manager and agents. A manager is a network management entity that monitors and manages groups of hosts and devices.

This lecture will discuss SNMP, and how it is used.

Topics Covered Include:
  • SNMP
  • SNMPv2
  • SNMPv3
SNMP
03:23

This lecture will ask some sample questions.

Chapter 3 Knowledge Check
00:53

Now, let's take some time to discuss Netflow. We'll define Netflow and discuss its importance. Be sure to keep this thought in mind -- In a network environment of any size, any statistical data you can retrieve from it is important.

This lecture will introduce you to netflow.

Topics Covered Include:
  • Introduction
Preview 00:22

Engineers need the ability to monitor their network with as much statistical data as possible. One of the best ways to monitor the network is by seeing real time data, so that constant analysis and focus can be kept on performance and security.

This lecture will give an overview of Netflow.

Topics Covered Include:
  • Overview of Netflow
Overview of Netflow
01:12

Netflow can analyze applications and provide a fundamental baseline as to how your network is operating on a daily and normal level. Consistent data taken over a stretch of time can help you look at bottlenecks in your network and determine if there is room for network design and redesign.

This lecture will discuss the reasons for using netflow.

Topics Covered Include:
  • Why Use NetFlow?
Why use Netflow?
00:54

When configuring Netflow, there are some parameters to consider. Take time to review the configurations in order to receive proper Netflow statistical data from as many devices as possible, which will ensure optimal network performance.

This lecture will discuss the ways of configuring Netflow.

Topics Covered Include:
  • Configuring NetFlow
  • Demonstration
Configuring Netflow
01:45

This lecture will ask some sample questions.

Chapter 4 Knowledge Check
00:55

This lecture will take you through some of the key points covered throughout the fourth portion of this section. Upon Completion of this section you will be prepared to move on to the next Section: IP Routing Technologies.

Summary
00:51

Section Quiz
5 questions
+
IP Routing Technologies
31 Lectures 56:47

Welcome to 'IP Routing Technologies'. In this course, we will cover IP routing technologies and the fundamentals of how routing decisions are made within devices.

This lecture will introduce you to IP Routing Technologies.

Topics Covered Include:
  • Introduction
Preview 01:40

CEF was introduced in the 1990's and replaced the existing internal routing logics of process switching and fast switching. But, why? Well, as you know, the faster a router can process data, the better. CEF optimized the internal processes of how a router forwards data.

This lecture will discuss CEF, and what it is used for.

Topics Covered Include:
  • Cisco Express Forwarding (CEF)
CEF
01:07

What does a device need to do in order to properly route its packets? Well, a router needs to have routes to remote networks in a routing table which point to the correct interface to send the data to in order to reach the destination network.

This lecture will discuss packet forwarding, and how it is used.

Topics Covered Include:
  • Packet Forwarding
  • Route Summarization
Packet Forwarding
03:08

The entire process begins when a device, which we will call “PCA”, wants to send an IP packet with a destination address of another PC, which we'll call “PCB”. PCA sends the packet to the first router because the destination address is in a different subnet.

This lecture will discuss the Route Lookup Process, and how it is used.

Topics Covered Include:
  • Administrative Distance
Route Lookup Process
02:43

This lecture will ask some sample questions.

Chapter 1 Knowledge Check
00:54

This lecture will take you through some of the key points covered throughout the first portion of this section. Upon Completion of this section you will be prepared to move on to the second portion.

Summary
00:24

Let's talk about basic router configuration and verification. First, we need to setup the router with a base configuration. We need to give it a hostname, a setup console, and terminal access.

This lecture will introduce you to Cisco Router and Switch Setup.

Topics Covered Include:
  • Introduction
Basic Router Configuration and Verification
03:36

When a router makes a decision about where to route a packet, it makes this decision by looking at a routing table full of static routes, dynamically learned routes, or both. In some cases, if there was no match for an IP address, the packet would be discarded.

This lecture will discuss the static and default routing, and how they are setup.

Topics Covered Include:
  • Static and Default Routing
Static and Default Routing
02:13

Now, let's take a look at InterVLAN routing. What if there are departments that are on separate VLANs? How do we get them to share data if a user needs access to a particular file share that is not on their subnet?

This lecture will discuss InterVLAN Routing, and how it is used.

Topics Covered Include:
  • InterVLAN Routing
  • Verification and Troubleshooting Commands
  • Configuring InterVLAN Routing
InterVLAN Routing
03:04

This lecture will ask some sample questions.

Chapter 2 Knowledge Check
01:08

This lecture will take you through some of the key points covered throughout the second portion of this section. Upon Completion of this section you will be prepared to move on to the third portion.

Summary
00:26

Routing protocols themselves are aids to routers in learning remote networks, so that the router knows what remote I-P network to send packets to. They dynamically learn about the routes, and will share routing information with other routers that use the same routing protocol.

This lecture will introduce you to routing protocols.

Topics Covered Include:
  • Introduction
Preview 02:54

An interior gateway protocol is a routing protocol used internally, within entities, or within one autonomous system. Each network created and paid for by a company, school, government, or likewise, is usually considered on autonomous system.

This lecture will discuss the interior and exterior gateway protocols, and how to follow.

Topics Covered Include:
  • Interior and Exterior Gateway Protocols
Interior and Exterior Gateway Protocols
00:59

This lecture will give several examples of routing protocols.

Examples of Routing Protocols
02:38

Administrative distance, or A-D, is the believability of a route. Each protocol has a defined Administrative Distance number. In this instance, these numbers are used in case there are two or more routes via two different routing protocols to a particular subnet.

This lecture will discuss the variables involved within routing protocols.

Topics Covered Include:
  • Routing Protocol Variables
Routing Protocol Variables
04:19

This lecture will ask some sample questions.

Chapter 3 Knowledge Check
00:57

This lecture will take you through some of the key points covered throughout the third portion of this section. Upon Completion of this section you will be prepared to move on to the fourth portion.

Summary
00:19

Open Shortest Path First, or OSPF, is a Link-State Protocol that gathers information from other routers in an autonomous system. It exchanges Link State Advertisements, or LSA messages, which are link state advertisements between neighbors.

This lecture will introduce you to OSPF.

Topics Covered Include:
  • Introduction
Preview 02:29

OSPF performs routine maintenance to ensure that routes are active in each other's tables. OSPF neighbors send each other hellos, in which the neighbor expects to hear an acknowledgement back that it received the hello.

This lecture will discuss the ways of maintaining OSPF.

Topics Covered Include:
  • OSPF Maintenance
OSPF Maintenance
01:11

OSPF elects a designated router and a backup designated router on an Ethernet link within an autonomous system. Once this election takes place, database exchanges occur between the designated router and all other routers.

This lecture will discuss the variables within OSPF.

Topics Covered Include:
  • OSPF Variables
OSPF Variables
02:13

OSPF is aware of the OSPF areas in which traffic flows. This helps keep LSA propagation to a minimum. Area 0 is the backbone area within OSPF, and the default area when you create an OSPF instance.

This lecture will discuss the area design within OSPF.

Topics Covered Include:
  • OSPF Area Design
  • Rules for Areas Within OSPF
OSPF Area Design
02:18

There are seven types of LSAs, or Link State Advertisements, that are passed between devices. The first LSA, Type 1, is a router link state and describes a router with its Router ID, interfaces, IP address and status.

This lecture will discuss the advertisements for Link State.

Topics Covered Include:
  • Link State Advertisements
Link State Advertisements
01:36

The first command is “show running-config”, which provides you with basic configuration information. “Show IP OSPF interface brief” will list all OSPF enabled interfaces and areas. This will provide you with a brief snapshot of how your router sees the OSPF network.

This lecture will discuss the ways of verifying OSPF.

Topics Covered Include:
  • Basic OSPF Verification Commands
  • Demonstration
OSPF Verification
02:47

This lecture will ask some sample questions.

Chapter 4 Knowledge Check
00:36

This lecture will take you through some of the key points covered throughout the fourth portion of this section. Upon Completion of this section you will be prepared to move on to the fifth portion.

Summary
00:23

Let's take a look at some of the concepts of EIGRP, including feasible distance and feasible successors, how the metric is comprised, and other variables in play with EIGRP.

This lecture will introduce you to EIGRP.

Topics Covered Include:
  • Introduction
Preview 02:16

EIGRP sends hellos in order to discover neighbors, check parameters to ensure who qualifies as a neighbor, and add them to the EIGRP neighbor table. EIGRP neighbors then exchange full network topology updates, and as mentioned, only sends partial updates as needed.

This lecture will give a brief overview of EIGRP.

Topics Covered Include:
  • Overview
Operational Overview
03:39

EIGRP has a load balancing capability. If there are multiple equal metric routes to the same destination, EIGRP will use them to load balance the communications for that subnet.

This lecture will discuss loading balancing, and how to do it.

Topics Covered Include:
  • Load Balancing
Load Balancing
00:29

Let's take a moment to discuss some verification and troubleshooting commands that can be used for EIGRP. Besides “Show running-config”, which will provide you with basic configuration information, “Show I-P protocols” provides the abbreviated configuration.

This lecture will discuss the ways of verifying EIGRP.

Topics Covered Include:
  • Basic EIGRP Verification and Troubleshooting Commands
  • Demonstration
EIGRP Verification
02:08

This lecture will ask some sample questions.

Chapter 5 Knowledge Check
01:15

This lecture will take you through some of the key points covered throughout the fifth portion of this section. Upon Completion of this section you will be prepared to move on to the next Section: IP Services and Security.

Summary
00:58

Section Quiz
5 questions
+
IP Services and Security
45 Lectures 01:01:48

In this course, we will look at some IP services and router and switch security. In the first chapter, we will talk about DHCP and how to configure it on a router. This will also include some of the commands that can modify DHCP for a more customized experience.

This lecture will introduce you to IP Services and Security.

Topics Covered Include:
  • Introduction
Preview 00:58

Dynamic Host Configuration Protocol, DHCP, is used to dynamically assign IP address information to user devices. You don't necessarily need a DHCP server running from a windows server on the network -- some of your Cisco devices can do that very thing.

This lecture will give a brief overview of DHCP.

Topics Covered Include:
  • Overview
Overview of DHCP
01:18

There are some design considerations for DHCP – such as deciding whether to have a Cisco device handle it or whether or not to use one centralized server or a server per LAN subnet.

This lecture will discuss the consideration for DHCP design.

Topics Covered Include:
  • DHCP Design Considerations
DHCP Design Considerations
00:47

The first variable is the subnet ID and subnet mask information. The server needs to know what subnet range to give out, and the mask in which to do so. But be careful, you must make sure to exclude particular addresses that you give statically on other devices.

This lecture will discuss the ways of configuring DHCP.

Topics Covered Include:
  • Configuring DHCP
Configuring DHCP
01:18

There are a few verification commands can greatly aid in troubleshooting a DHCP issue. “Show IP DHCP binding” lists each address currently assigned to a client or device. “Show IP DHCP pool” lists configuration information of the pool, statistics, and its operation and leases.

This lecture will discuss the ways of verifying DHCP.

Topics Covered Include:
  • DHCP Verification
DHCP Verification
00:46

This lecture will ask some sample questions.

Chapter 1 Knowledge Check
01:21

This lecture will take you through some of the key points covered throughout the first portion of this section. Upon Completion of this section you will be prepared to move on to the second portion.

Summary
00:31

This chapter will focus on access control lists, or ACLs. We will define ACLs, look at their function, and discuss the different types. ACLs are both a powerful and important aspect of networking. If they are not applied correctly, they can prevent a network component or a user from connecting to the network.

This lecture will introduce you to ACL.

Topics Covered Include:
  • Introduction
Preview 00:37

Access Control Lists have many uses, including filtering packets out of many types of applications, and applying QoS. You can create access lists to block particular traffic from gaining access to your device, and also block particular hosts or subnets from gaining access to a particular subnet.

This lecture will discuss the uses of ACL.

Topics Covered Include:
  • ACL Uses
ACL Uses
01:32

There are many types of access-lists, including a standard, extended, and named access list. The standard access-list matches only source traffic, and the numbering scheme is 1 through 99, and 1300 through 1999.

This lecture will discuss the types of access lists, and what they are used for.

Topics Covered Include:
  • Types of Access Lists
Types of Access Lists
00:55

When deploying access lists of the standard variety, they should be placed near the destination, as it can only match a packet's source IP address. This is done so that packets are not unintentionally discarded.

This lecture will discuss what the standard access list looks like.

Topics Covered Include:
  • Standard Access Lists
Standard Access Lists
00:41

With an extended ACL, you can perform more filtering techniques. Extended ACLs have the same rules and deployment methods as standard ACLs, like matching all aspects in the line, and the implicit deny at the end.

This lecture will discuss the access lists that are extended.

Topics Covered Include:
  • Extended Access Lists
Extended Access Lists
01:53

There are a few differences between named and standard ACLs. First, naming the access list ensures a cleaner and clearer configuration. When you have multiple access list groups, naming them can keep the management side of things easier for all involved, and help avoid mistakes.

This lecture will discuss the access lists that are named.

Topics Covered Include:
  • Named Access Lists
  • Demonstration
Named Access Lists
03:30

This lecture will ask some sample questions.

Chapter 2 Knowledge Check
01:02

This lecture will take you through some of the key points covered throughout the second portion of this section. Upon Completion of this section you will be prepared to move on to the third portion.

Summary
00:23

In this chapter, we will take a look at Network Address Translation, or NAT. We will look at the basics behind it, why it's needed, some NAT terminology, and how to configure certain aspects of it.

This lecture will introduce you to NAT.

Topics Covered Include:
  • Introduction
Preview 01:24

In a typical NAT, the term inside refers to an address used for a host inside an enterprise. An Inside local is the actual I-P address assigned to a host in the private enterprise network. A more descriptive term might be inside private.

This lecture will discuss the Terminology for NAT.

Topics Covered Include:
  • Terminology
NAT Terminology
02:28

There are several variations of NAT that can be used. First is Static NAT. This type of NAT doesn't help with the IPv4 depletion issue, but it does help to translate local private I-P addresses, called inside local, to public ones, which are called inside global.

This lecture will discuss static NAT, and what it is used for.

Topics Covered Include:
  • Static NAT
  • Static NAT Configuration
Static NAT
01:55

Dynamic NAT translation does a one-to-one NAT translation -- but dynamically. You define a pool of translated addresses to be used, inside global IP's. Then an access list is created, defined as addresses that should be translated to this pool.

This lecture will discuss the Dynamic NAT, and what it is used for.

Topics Covered Include:
  • Dynamic NAT
  • PAT
  • Dynamic NAT Configuration
  • Demonstration
Dynamic NAT
05:13

This lecture will ask some sample questions.

Chapter 3 Knowledge Check
01:19

This lecture will take you through some of the key points covered throughout the third portion of this section. Upon Completion of this section you will be prepared to move on to the fourth portion.

Summary
00:19

This chapter provides an overview of Network Time Protocol, or NTP. We will define NTP and walk through each of the steps involved in its configuration.

This lecture will introduce you to NTP.

Topics Covered Include:
  • Introduction
Preview 00:16

NTP gives provides any device with the ability to sync its clock with a central time source. That central time source could be a publically managed NTP server on the Internet, or even a switch or a router on your network that you designate as your NTP server.

This lecture will give a brief overview of NTP.

Topics Covered Include:
  • Overview
Overview of NTP
00:50

To configure NTP, a single command is needed. The NTP server command with the IP address following that command will tell the router where the NTP server is located, making it a NTP client.

This lecture will discuss the ways of configuring NTP.

Topics Covered Include:
  • Configuring NTP
  • Configuring NTP Authentication
Configuring NTP
01:39

This lecture will ask some sample questions.

Chapter 4 Knowledge Check
01:05

This lecture will take you through some of the key points covered throughout the fourth portion of this section. Upon Completion of this section you will be prepared to move on to the fifth portion.

Summary
00:17

This chapter focuses on high availability. We will discuss many different high availability protocols, but, the good news is that most of them have similar functions, and the configuration of each is only slightly different.

This lecture will introduce you to High Availability.

Topics Covered Include:
  • Introduction
Preview 00:22

First Hop Redundancy Protocol is a family of protocols that handle first hop redundancy. This means that two or more routers appear as a single gateway and act as redundant partners. This is done with a virtual I-P address that is shared across the devices.

This lecture will discuss First Hop Redundancy Protocol, and what it is used for.

Topics Covered Include:
  • First Hop Redundancy Protocol
First Hop Redundancy Protocol
00:52

Hot Standby Routing Protocol, or H-S-R-P, is in active standby model, with two or more routers participating to be the default gateway by continually exchanging status messages with each other. Each device has a default priority of 100.

This lecture will discuss Hot Standby Routing Protocol (HSRP), and what it is used for.

Topics Covered Include:
  • Hot Standby Routing Protocol (HSRP)
Hot Standby Routing Protocol (HSRP)
01:24

Gateway Load Balancing Protocol, or GLBP, is an active setup, and load balancing can be completed based upon packet load, not subnet. One router still acts as an important router, known as the Active Virtual Gateway, or AVG, in this case.

This lecture will discuss the Gateway Load Balancing Protocol (GLBP), and what it is used for.

Topics Covered Include:
  • Gateway Load Balancing Protocol (GLBP)
Gateway Load Balancing Protocol (GLBP)
00:59

Configuration for HSRP and GLBP are very similar, with just a few key words changed. GLBP and HSRP both have the ability to prioritize who their main AVG and active router are. “Show running-config” can verify current setup, and the ”Show standby brief” and Show GLBP brief” can show interface.

This lecture will discuss the ways of configuring HSRP and GLBP.

Topics Covered Include:
  • Configuring HSRP and GLBP
  • Demonstration
Configuring HRSP and GLBP
03:39

This lecture will ask some sample questions.

Chapter 5 Knowledge Check
01:26

This lecture will take you through some of the key points covered throughout the fifth portion of this section. Upon Completion of this section you will be prepared to move on to the sixth portion.

Summary
00:21

This chapter will cover securing cisco routers and switches. Some of these topics may be review for you, but either way, variables like device and switchport security are very important and necessary in the real world.

This lecture will introduce you to Securing Cisco Routers and Switches.

Topics Covered Include:
  • Introduction
Preview 00:30

Don't forget the difference between enable password and enable secret password: The enable password option is not encrypted when it's stored in Nonvolatile RAM as the startup-configuration file, and when you configure enable password, the password is shown in clear text in the configuration.

This lecture will discuss the security of a device.

Topics Covered Include:
  • Device Security
  • Authentication
  • Basic Terminal Access via Telnet
  • Configuration SSH
Device Security
04:01

When it comes to an out-of-the-box Cisco device, there are services that are turned on by default that might not be the most secure or advantageous, especially if you are not using them. Oftentimes, most people don't even know they are there or on.

This lecture will discuss the modifications that are made to the default service.

Topics Covered Include:
  • Default Service Modification
Default Service Modification
01:06

Small Services is a service that is rarely used. It's an IOS (EYE-OSE) feature that works like ping, but doesn't use ICMP to do it. This service is turned on by default on IOS (EYE-OSE) versions 11.2 and earlier, and turned off by default on IOS (EYE OSE) versions 11.3 on later.

This lecture will discuss the small services, and what they do.

Topics Covered Include:
  • Small Services
Small Services
00:35

In any situation, Telnet should not be allowed on your device, however, you can limit I-P ranges to Telnet if you need to configure your devices to ensure connections time out and do not hang in the system.

This lecture will discuss the Teknet and SSH Access.

Topics Covered Include:
  • Telnet and SSH Access
Telnet and SSH Access
00:29

Banners are also useful tools for Cisco devices. You can send messages to your users when they login that provide some sort of warning regarding unauthorized access.

This lecture will discuss banners, and what they are used for.

Topics Covered Include:
  • Demonstration
Banners
03:25

Port security can help protect against unauthorized access to switch ports, either on access ports or trunk ports. Port security will fall under the switchport security settings when it is enabled on a switchport, if a voice VLAN is configured.

This lecture will discuss the port security.

Topics Covered Include:
  • Port Security
  • Switchport Security Modes
  • Switchport Security MAC Address Modes
  • Port Security Verification
Port Security
02:49

“Switchport mode access” statically defines the port. “Switchport port-security” enables port-security. “Switchport port-security maximum (number)” is the number of MACs (macks) allowed.

This lecture will discuss the ways of configuring port security.

Topics Covered Include:
  • Configuring Port Security
Configuring Port Security
00:37

There are a few verification checks available for troubleshooting. “Show running-config” will give you your base configuration and will show you the switch ports. The switchport configuration will show the actual MAC addresses that were retained if you are using sticky configuration.

This lecture will discuss the ways to verify port security.

Topics Covered Include:
  • Verify Port Security
  • Demonstration
Verifying Port Security
02:13

Switchport maintenance should be completed on a regular basis. It is always recommended to shut down unused switchports for security purposes. It is also recommended to disable trunking from occurring on ports you know will never or should never trunk.

This lecture will discuss the maintenance of switchports.

Topics Covered Include:
  • Switchport Maintenance
Switchport Maintenance
00:43

This lecture will ask some sample questions.

Chapter 6 Knowledge Check
01:10

This lecture will take you through some of the key points covered throughout the sixth portion of this section. Upon Completion of this section you will be prepared to move on to the next Section: Troubleshooting Routers and Switches.

Summary
00:50

Section Quiz
5 questions
+
Troubleshooting Routers and Switches
23 Lectures 01:03:22

This course covers troubleshooting procedures and methodology. Most people have their own method of troubleshooting. It's important that you learn to develop your own style as well.

This lecture will introduce you to Troubleshooting Routers and Switches.

Topics Covered Include:
  • Introduction
Preview 00:33

There are three branches of troubleshooting methodology. The first branch is analyze and predict normal operation. There should be a fundamental baseline operation that is known by network engineers.

This lecture will discuss the branches of troubleshooting.

Topics Covered Include:
  • Troubleshooting Methodology
  • Common Examples
  • Maintenance Window
Branches of Troubleshooting
04:00

This lecture will ask some sample questions.

Chapter 1 Knowledge Check
00:43

This lecture will take you through some of the key points covered throughout the first portion of this section. Upon Completion of this section you will be prepared to move on to the second portion.

Summary
00:50

Common IP addressing issues include misconfigured IP addresses and misconfigured subnet masks. This is generally due to errors in the configuration. Many times, network administrators race through this aspect of configuration and put in an incorrect IP address or subnet.

This lecture will discuss problems with IP Addressing.

Topics Covered Include:
  • IP Addressing Problems
  • IP Configuration Commands
IP Addressing Problems
01:56

Some questions to ask yourself when troubleshooting VLANs are -- does the VLAN exist? Are they assigned to the proper ports? Just because VLAN 10 is on the switch, does not necessarily mean that VLAN 10 was created on that specific VLAN switch. VTP is also thrown into the mix.

This lecture will discuss problems with VLAN.

Topics Covered Include:
  • VLAN Problems
  • VLAN Configuration Commands
VLAN Problems
01:37

We need to ensure that when there is a trunking issue, we look at both ends of the trunk. If you have specified a particular trunking protocol to be used, either 802.1q or I-S-L, you will need to ensure that they match on both ends.

This lecture will discuss the problems with Trunking.

Topics Covered Include:
  • Trunking Configuration Commands
  • InterVLAN Configuration Commands
  • Demonstration
Trunking Problems
08:02

The most common issues for spanning tree revolve around a root bridge not located where it's supposed to be, or a spanning-tree mode misconfiguration. Root bridge placement should be in a centralized location, where it can handle the amount of traffic.

This lecture will discuss the problems with spanning trees.

Topics Covered Include:
  • Spanning Tree Problems
Spanning Tree Problems
02:14

Like trunking, you need to ensure that Etherchannel negotiation is correct and the protocol is the same on both ends, otherwise they will not understand each other. If you are looking to use PAGP or LACP, they must match on both ends. If you choose “ON” for one switch, you must choose “ON” for the other switch.

This lecture will discuss the problems with Etherchannel.

Topics Covered Include:
  • Etherchannel Problems
  • Etherchannel Configuration Commands
  • Demonstration
Etherchannel Problems
06:01

This lecture will ask some sample questions.

Chapter 2 Knowledge Check
01:03

This lecture will take you through some of the key points covered throughout the second portion of this section. Upon Completion of this section you will be prepared to move on to the third portion.

Summary
00:22

Now, let's take some time to discuss common routing issues. First, we'll take a look at general dynamic and static routing issues, along with OSPF and EIGRP issues.

This lecture will introduce you to routing problems.

Topics Covered Include:
  • Introduction
Preview 00:17

Some of the most common issues that occur in routing, whether dynamic or static, can be resolved with a general knowledge of how the network should actually work.

This lecture will discuss the general issues with routing.

Topics Covered Include:
  • General Routing Issues
General Routing Issues
02:21

Now, let's dive into OSPF troubleshooting. Before you begin OSPF troubleshooting, check all of your interface configurations. Verify that your IP addresses are correct, and that all interfaces are up, and not shutdown. This can save you ample time and frustration later on.

This lecture will discuss troubleshooting OSPF.

Topics Covered Include:
  • OSPF Troubleshooting
  • OSPF Configuration Commands
  • Demonstration
OSPF Troubleshooting
08:53

EIGRP has a few common issues. One of them being hello and hold timers not matching. Another issue is based on the fact that EIGRP autonomous system numbers must match between routers.

This lecture will discuss troubleshooting EIGRP.

Topics Covered Include:
  • EIGRP Troubleshooting
  • IP Configuration Commands
  • Demonstration
EIGRP Troubleshooting
06:49

This lecture will ask some sample questions.

Chapter 3 Knowledge Check
00:59

This lecture will take you through some of the key points covered throughout the third portion of this section. Upon Completion of this section you will be prepared to move on to the fourth portion.

Summary
00:23

There are a variety of miscellaneous topics that require troubleshooting, including access control lists, WAN connections and Layer 1 issues. These are important topics, especially access control lists, as they provide a very useful tool for limiting or filtering traffic.

This lecture will introduce you to Miscellaneous Troubleshooting.

Topics Covered Include:
  • Introduction
Preview 00:45

When working with access control lists, you need to pay considerable attention to detail because they are very powerful. ACLs should always be implemented in a test environment first and then put on a network during an outage to ensure network availability.

This lecture will discuss troubleshooting ACLs.

Topics Covered Include:
  • Troubleshooting ACLs
Troubleshooting ACLs
03:13

When dealing with WANs, we will talk mostly about Serial connections, PPP encapsulation and frame-relay. One of the first things to verify, like with many other troubleshooting activities, is your network topology and IP address scheme.

This lecture will discuss troubleshooting WANs.

Topics Covered Include:
  • Troubleshooting WANs
  • Demonstration
Toubleshooting WANs
07:52

When an interface reaches an up-up status, the switch considers this interface to be working. The first 'up' stands for the physical status of the interface, or the Layer 1 status. The second 'up' stands for the Layer 2.

This lecture will discuss troubleshooting layer interfaces.

Topics Covered Include:
  • Troubleshooting Layer 1 Interfaces
  • Troubleshooting Layer 1 Configuration Command
Troubleshooting Layer Interfaces
03:06

This lecture will ask some sample questions.

Chapter 4 Knowledge Check
00:50

This lecture will take you through some of the key points covered throughout the fourth portion of this section. Upon Completion of this section you will be prepared to move on to the next Section: Security and Cisco Routers.

Summary
00:33

Section Quiz
5 questions
+
Pre-Assessment: CCNA Security
0 Lectures 00:00
Pre-Assessment: CCNA Security (640-554 IINS)
13 questions
18 More Sections
About the Instructor
LearnSmart LLC
4.2 Average rating
10,776 Reviews
84,037 Students
68 Courses
Smarter Training. Never Open a Textbook.

LearnSmart has served the learning community with high-quality professional skills and IT certification training since 1997. In that time, the company has helped thousands earn career-related certifications from respected vendors, such as Project Management Institute (PMI)®, Cisco, Microsoft, CompTIA, Oracle, and EC-Council. LearnSmart offers over 1,000 courses covering IT, project management, administrative, HR, and workplace safety topics. With a rapidly growing clientele of individuals and corporations, LearnSmart serves a broad range of Fortune 500 companies to universities, as well as government institutions and the armed forces.

LearnSmart is able to meet diverse career and learning needs through its extensive selection of training. LearnSmart uses industry experts to give learners the most up-to-date content in a video format as well as training resources including; reference tools, pretests, study guides and labs. For more information about how we can help pinpoint and solve your individual or multi-user training challenges.

PMI is a registered trademark of the Project Management Institute, Inc.