xxi
single area (as a review) and multiarea. Topics again include the design, imple-
mentation, verification, and troubleshooting of the protocol in both IPv4 and IPv6.
Q
Chapter 4 , “Configuration of Redistribution” : This chapter show how to
manipulate routing information. Topics include prefix lists, distribution lists, route
maps, route redistribution, and static routes in both IPv4 and IPv6.
Q
Chapter 5 , “Path Control Implementation” : This chapter deals those tools and
commands that you can use to help evaluate network performance issues and con-
trol the path. Topics include CEF, Cisco IOS IP SLAs, and policy-based routing
using route maps in both IPv4 and IPv6.
Q
Chapter 6 , “Enterprise Internet Connectivity” : This chapter starts with DHCP
and NAT and then deals with the use of BGP to connect an enterprise network
to a service provider. Topics include the configuration, verificiation, and trouble-
shooting of a BGP-based solution, BGP attributes, regular expressions, and BGP
route filtering using access lists.
Q
Chapter 7 , “Routers and Router Protocol Hardening” : This chapter starts with
checklists to follow when securing Cisco routers and the components of a router
security policy. It then moves into topics such as password encryption, SSH,
secure SNMP, backups, logging, and Network Time Protocol (NTP), and finishes
with authentication of EIGRP, OSPF, and BGP.
Part II : SWITCH
Q
Chapter 8 , “Basic Concepts and Network Design” : This chapter covers topics
such as SDM templates, LLDP, PoE, and switch verification commands.
Q
Chapter 9 , “Campus Network Architecture” : This chapter provides infor-
mation on virtual LANs—creating, verifying, and troubleshooting them, along
with EtherChannel, DHCPv4 and DHCPv6, and configuring and verifying voice
VLANs.
Q
Chapter 10 , “Implementing Spanning Tree” : This chapter provides information
on the configuration of spanning tree, along with commands used to verify the
protocol and to configure enhancements to spanning tree, such as Rapid Spanning
Tree and Multiple Spanning Tree. The Cisco STP Toolkit is also shown here,
along with FlexLinks.
Q
Chapter 11 , “Implementing Inter-VLAN Routing” : This chapter shows the
different ways to enable inter-VLAN communication—using an external router or
using SVIs on a multilayer switch.
Q
Chapter 12 , “Implementing High-Availability Networks” : This chapter covers
topics such as IP service level agreements, port mirroring, and switch virtualiza-
tion.
Q
Chapter 13 , “First-Hop Redundancy Implementation” : This chapter provides
information needed to ensure that you have first-hop redundancy; HSRP, VRRP,
and GLBP are shown here in both IPv4 and IPv6.
Q
Chapter 14 , “Campus Network Security” : Security is the focus of this chap-
ter. Topics covered include switch security recommended practices, static MAC
addresses, port security, 802.1x authentication, mitigating VLAN hopping, DHCP
snooping, DAI, and private VLANs.