Escolar Documentos
Profissional Documentos
Cultura Documentos
CISCO, INC.
ACCESSING THE WAN
Page
CISCO, INC.
ACCESSING THE WAN
Introduction to WANs Providing Integrated Services to the Enterprise Introducing Wide Area Networks (WANs) The Evolving Enterprise The Evolving Network Model WAN Technology Concepts WAN Technology Overview WAN Physical Layer Concepts WAN Data Link Layer Concepts WAN Switching Concepts WAN Connection Options WAN Link Connection Options Dedicated Connection Link Options Circuit Switched Connection Options Packet Switched Connection Options Internet Connection Options PPP Serial Point-to-Point Links Introducing Serial Communications TDM Demarcation Point DTE and DCE HDLC Encapsulation Configuring HDLC Encapsulation Troubleshooting a Serial Interface PPP Concepts Introducing PPP PPP Layered Architecture PPP Frame Structure Establishing a PPP Session Establishing a Link with LCP NCP Explained
P-New, 2.1.1 P-New, 2.3.3 P-New, 2.3.4, 2.3.5 2.1.3 2.1.1-2.1.3 2.1.2-2.1.4, 2.1.6 2.1.5 P-New, 2.1.6 2.2.3 2.2.1, 2.2.2 2.2.4-2.2.6 P-New, 2.1.6, 2.2.7, 2.2.8
P-New, 3.1.1 3.1.2 3.1.3 3.1.4 3.1.5 3.1.6 3.1.7 3.2.1 3.2.1 3.2.1 3.2.2 3.2.2-3.2.5 P-New, 3.2.2
Page
CISCO, INC.
ACCESSING THE WAN
New/ Existing Content 3.3.1 3.3.2 3.3.4 P-New, 3.3.5 3.2.3 3.2.4 3.2.5 3.2.6 3.2.6 3.3.5
Configuring PPP PPP Configuration Options PPP Configuration Commands Verifying a Serial PPP Encapsulation Configuration Troubleshooting PPP Encapsulation Configuring PPP with Authentication PPP Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) PPP Encapsulation and Authentication Process Configuring PPP with Authentication Troubleshooting a PPP Configuration with Authentication Frame Relay Basic Frame Relay Concepts Introducing Frame Relay Virtual Circuits Frame Relay Encapsulation Frame Relay Topologies Frame Relay Address Mapping Configuring Frame Relay Configuring Basic Frame Relay Configuring Static Frame Relay Maps Advanced Frame Relay Concepts Solving Reachability Issues Paying for Frame Relay Frame Relay Flow Control Configuring Advanced Frame Relay Configuring Frame Relay Subinterfaces Verifying Frame Relay Operation Troubleshooting Frame Relay Configuration Network Security Introduction to Network Security Why is Network Security Important? Common Security Threats Types of Network Attacks General Mitigation Techniques
P-New, 5.1.1, 5.1.2 P-New, 5.1.2 5.1.3 P-New, 5.1.5 P-New, 5.1.6, 5.1.7 5.2.1 5.2.2 5.2.3, 5.2.4 NEW 5.1.4 5.2.5, 5.2.4 5.2.6 5.2.7
CISCO, INC.
ACCESSING THE WAN
The Network Security Wheel The Enterprise Security Policy Securing Cisco Routers Router Security Issues Applying Cisco IOS Security Features to Routers Manage Router Security Securing Remote Administrative Access to Routers Logging Router Activity Secure Router Network Services Vulnerable Router Services and Interfaces Securing Routing Protocols Locking Down Your Router with Cisco Auto Secure Using Cisco SDM Cisco SDM Overview Configuring Your Router to Support Cisco SDM Starting Cisco SDM The Cisco SDM Interface Cisco SDM Wizards Locking Down a Router with Cisco SDM Secure Router Management Maintaining Cisco IOS Software Images Managing Cisco IOS Images Managing Cisco IOS Images Backing up and Upgrading Software Images Recovering Software Images Troubleshooting Cisco IOS Configurations Recovering a Lost Router Password ACLs Using ACLs to Secure Networks A TCP Conversation Packet Filtering What is an ACL? ACL Operation Types of Cisco ACLs How a Standard ACL Works Numbering and Naming ACLs Where to Place ACLs General Guidelines for Creating ACLs
New/ Existing Content NEW NEW NEW NEW NEW NEW 6.2.9 NEW NEW NEW
NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW
CISCO, INC.
ACCESSING THE WAN
New/ Existing Content NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW NEW
Configuring Standard ACLs Entering Criteria Statements Configuring a Standard ACL ACL Wildcard Masking Applying Standard ACLs to Interfaces Editing Numbered ACLs Creating Standard Named ACLs Monitoring and Verifying ACLs Editing Named ACLs Configuring Extended ACLs Extended ACLs Configuring Extended ACLs Applying Extended ACLs to Interfaces Creating Named Extended ACLs Configure Complex ACLs What are Complex ACLs? Dynamic ACLs Reflexive ACLs Time-based ACLs Troubleshooting Common ACL Errors Teleworker Services Business Requirements for Teleworker Services The Business Requirements for Teleworker Services The Teleworker Solution Broadband Services Connecting Teleworkers to the WAN Cable DSL Broadband Wireless VPN Technology VPNs and Their Benefits Types of VPNs VPN Components Characteristics of Secure VPNs VPN Tunneling VPN Data Integrity IPsec Security Protocols IP Addressing Services DHCP
NEW NEW P-New, 2.1.2 P-New, 2.2.8 P-New, 2.2.7 NEW NEW NEW NEW NEW NEW NEW NEW
Page
CISCO, INC.
ACCESSING THE WAN
Introducing DHCP DHCP Operation BOOTP and DHCP Configuring a DHCP Server Configuring a DHCP Client DHCP Relay Configuring a DHCP Server Using SDM Troubleshooting DHCP Scaling Networks with NAT Private and Public IP Addressing What is NAT? Benefits and Drawbacks of Using NAT Configuring Static NAT Configuring Dynamic NAT Configuring NAT Overload Configuring Port Forwarding Verifying and Troubleshooting NAT Configurations IPv6 Reasons for Using IPv6 IPv6 Addressing IPv6 Transition Strategies Cisco IOS Dual Stack IPv6 Tunneling Routing Considerations with IPv6 Configuring IPv6 Addresses Configuring RIPng with IPv6 Reasons for Using IPv6 Network Troubleshooting Establishing the Network Performance Baseline Documenting Your Network Documenting Your Network Why is Establishing a Network Baseline Important? Steps for Establishing a Network Baseline Troubleshooting Methodologies and Tools A General Approach to Troubleshooting Using Layered Models for Troubleshooting General Troubleshooting Procedures
New/ Existing Content P-New, 1.2.1, 1.2.3 1.2.1, 1.2.3, 1.2.4 P-New, 1.2.2 1.2.5, 1.2.6 P-New, 1.2.4 1.2.8 NEW P-New, 1.2.7 P-New, 1.1.1 1.1.2-1.1.4 1.1.3, 1.1.7 1.1.4 1.1.4 1.1.4 NEW P-New, 1.1.6
P-New, 6.2.1, 6.2.2, 6.2.9 NEW P-New, 6.2.8 P-New, 6.2.9 NEW NEW NEW
Page
CISCO, INC.
ACCESSING THE WAN
8.3 8.3.1 8.3.2 8.3.3 8.3.4 8.3.5 8.3.6 8.3.7 8.4 8.4.1 8.4.2 8.4.3
Common WAN Implementation Issues WAN Communications Steps in WAN Design WAN Traffic Considerations WAN Topology Considerations WAN Bandwidth Considerations Common WAN Implementation Issues Case Study: WAN Troubleshooting from an ISPs Perspective Network Troubleshooting Interpreting Network Diagrams to Identify Problems Physical Layer Troubleshooting Data Link Layer Troubleshooting
NEW NEW P-New, 3.1.7, 3.3.4, 3.3.5, 5.2.6, 5.2.7 NEW NEW NEW
CISCO, INC.
ACCESSING THE WAN
Page
CISCO, INC.
ACCESSING THE WAN
Summary of Changes
The CCNA Exploration: Accessing the WAN curriculum has some pedagogical changes that have been applied to make the learning process more effective. The changes include the following: Access Control Lists have moved from semester 2 and are more advanced. ISDN has been removed. Work stations and servers have been removed. Network Security has been added. Tele-worker services and remote access security have been added. IPv6 configuration has been added. Enterprise troubleshooting has been added. Converged network services has been added.
Page