WAN Administration

COURSE DESCRIPTION:
Router Networking validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN. The curriculum includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. This new curriculum also includes (but is not limited to) the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),LANs, Ethernet, access control lists (ACLs).
CERTIFICATION
Receive an instructor-signed certificate with the institution’s logo to verify your achievement and increase your job prospects
Course Features
- Lectures 280
- Quizzes 0
- Duration 50 hours
- Skill level All levels
- Language English
- Students 0
- Assessments Yes
-
Introduction to Networking
- Connecting to the Internet. Network Math
- Networking Fundamentals
- Networking Terminology. Bandwidth. Networking Models
- Networking Media
- Copper Media. Optical Media. Wireless Media.
- Cabling Testing.
- Frequency-Based Cable Testing. Signals and Noise.
- Cabling LANs and WANs
- Ethernet Fundamentals
- Ethernet Fundamentals. Ethernet Operation
- Ethernet Technologies.
- 10-Mbps and 100-Mbps Ethernet. Gigabit and 10-Gigabit Ethernet. Check Your Understanding
- Ethernet Switching.
- TCP/IP Protocol Suite and IP Addressing
- Introduction to TCP/IP. Internet Addresses. Obtaining an IP Address.
- Routing Fundamentals and Subnets.
- Routed Protocol. IP Routing Protocols. The Mechanics of Subnetting.
- TCP/IP Transport and Application Layers
- WANs and Routers.
- Introduction to Routers
- Operating IOS Software. Starting a Router.
- Configuring a Router
- Configuring a Router. Finishing the Configuration.
- Learning About Other Devices.
- Discovering and Connecting to Neighbors. Getting Information About Remote Devices
- Managing IOS Software.
- Router Boot Sequence and Verification. Managing the File System.
- Routing and Routing Protocols.
- Introduction to Static Routing. Dynamic Routing Overview. Routing Protocols Overview.
- Distance Vector Routing Protocols
- Distance Vector Routing. RIP. IGRP.
- TCP/IP Suite Error and Control Messages.
- Overview of TCP/IP Error Messages. Overview of TCP/IP Suite Control Messages.
- Basic Router Troubleshooting.
- Examining the Routing Table. Network Testing. Troubleshooting Router Issues Overview.
- Intermediate TCP/IP.
- TCP Operation. Overview of Transport Layer Ports.
- Access Control List Fundamentals. Access Control Lists
- Layered Network Model: OSI Reference Model
- Peer-to-Peer Communication. Data Encapsulation.
- Physical Layer. Ethernet/802.3 Physical Connections
- Data Link Layer. Ethernet/802.3 Interface
- Network Layer. IP Addressing and Subnets
- Path Determination. Path Communication
- ICMP. ARP. Routing. Routed Versus Routing Protocols
- IP Routing Configuration Tasks. Transport Layer
- Segmenting Upper-Layer Applications
- Establishing a Connection. Data Transfer
- Reliability with Windowing. Acknowledgment Techniques
- SWITCHING BASICS AND INTERMEDIATE ROUTING
- Classless Routing
- Route Aggregation and Supernetting
- Supernetting and Address Allocation
- Variable-Length Subnet Masking (VLSM)
- VLSM Features. Calculating VLSMs
- Configuring VLSM. VLSM Using RIP and IGRP
- Route Summarization. Summarization Within an Octet.
- Summarization with a Discontiguous Network.
- Route Flapping. RIP Version 2
- Short History of RIP. RIP Version 2 Features.
- Short History of RIP. RIP Version 2 Features.
- Comparing RIPv1 and RIP v2. Configuring RIP Version 2.
- Verifying RIP V2. Troubleshooting RIP. Default Routes.
- Verifying RIP V2. Troubleshooting RIP. Default Routes.
- Comparing RIPv1 and RIP v2. Configuring RIP Version 2.
- Verifying RIP V2. Troubleshooting RIP. Default Routes.
- Single-Area OSPF.
- Single-Area OSPF Concepts.
- OSPF Terminology. OSPF States
- Comparing OSPF with Distance Vector Routing Protocols
- Shortest Path First Algorithm. OSPF Network Types
- OSPF Hello Protocol. Steps in OSPF Operations
- Establishing a Router Adjacency. Electing a DR and BDR
- Discovering Routes. Selecting the Best Route
- Maintaining Route Information. Single-Area OSPF Configuration
- Configuring a Loopback Address. Modifying OSPF Router Priority
- Modifying OSPF Cost Metric. Configuring OSPF Authentication
- Configuring OSPF Timers. Configure OSPF over NBMA
- Full-Mesh Frame Relay. Partial-Mesh Frame Relay
- Point-to-Multipoint OSPF. Propagating a Default Route
- Common OSPF Configuration Issues. Verifying the OSPF Configuration
- Enhanced Interior Gateway Routing Protocol
- EIGRP Processes and Technology
- Independence from Routed Protocols. EIGRP Terminology.
- Neighbour Table. Topology Table.
- Successor. Feasible Successor
- Selection of Successors and Feasible Successors
- Stuck in Active Routes. Routing Table
- Route Tagging. EIGRP Features and Technologies
- Neighbor Discovery and Recovery
- Reliable Transport Protocol. DUAL Finite-State Machine
- PDMs. EIGRP Packet Types
- Hello Packets. Acknowledgment Packets
- Update Packets. Query and Reply Packets
- EIGRP Convergence. Configuring EIGRP
- Configuring EIGRP for IP. Configuring Bandwidth with NBMA
- Configuring Bandwidth over a Multipoint Network
- Configuring Bandwidth over a Hybrid Multipoint Network
- Using the ip bandwidth-percent Command
- Configuring EIGRP Summarization
- Switching Concepts and LAN Design
- Ethernet/802.3 LANs. Ethernet/802.3 LAN Development
- Factors That Impact Network Performance
- Elements of Ethernet/802.3 Networks
- Half-Duplex Ethernet Networks. Full-Duplex Ethernet Networks
- Introduction to LAN Switching. LAN Segmentation
- LAN Segmentation with Bridges. LAN Segmentation with Routers.
- Ethernet Switch Latency. Layer 2 and Layer 3 Switching.
- Implications of Layer 2 and Layer 3 Switching
- Symmetric and Asymmetric Switching.
- Memory Buffering.
- LAN Design. LAN Design Considerations
- Function and Placement of Servers.
- Segmentation Issues. Broadcast Domain Issues.
- LAN Design Methodology. Factors That Affect Network Availability.
- Designing the Physical Network Topology.
- Layer 1 Design. Layer 2 Design. Layer 3 Design.
- Basic Layer 2 Bridging and Switching.
- How Switches and Bridges Filter Frames
- Filtering Types.
- Switches
- Overview of Switches. Starting the Switch.
- Physical Startup of the Catalyst Switch.
- Switch LED Indicators. Verifying Port LEDs During Switch POST.
- Viewing Initial Bootup Output from the Switch.
- Examining Help in the Switch Command-Line Interface. LAN Switches and Hierarchical Network Design.
- LAN Switches and Hierarchical Network Design.
- The Core Layer. The Distribution Layer.
- Access Layer. Switched LANs, Access Layer Overview.
- Access Layer Switches. Distribution Layer Overview.
- Distribution Layer Switches. Core Layer Overview.
- Core Layer Switches.
- Switch Configuration.
- Microsegmentation. Microsegmentation Implementation
- How a Switch Learns Addresses. Switch Forwarding.
- Store-and-Forward. Cut-Through. Symmetric Switching
- Asymmetric Switching. Memory Buffering.
- Switches and Collision Domains. Switches and Broadcast Domains.
- PC to Switch Transmission. Communication Between Switches
- Verifying the Initial Configuration of a Catalyst Switch
- Verifying the Catalyst Switch Default Configuration
- Switch Port Properties. VLAN Properties
- The Flash Directory. Displaying IOS Version Information
- Benefits of Using the Default Configuration
- Configuring the Network Settings of the Catalyst Switch
- Resetting the Switch Defaults
- Assigning the Switch Host Name and Passwords
- Assigning the Switch IP Address and Default Gateway
- Setting Port Characteristics. Web-Based Interface
- Managing the MAC Address Table
- Configuring Static MAC Addresses
- Configuring Port Security. Executing Adds, Moves, and Changes
- Managing Switch Operating System Images and Device Configuration Files
- 1900/2950 Password Recovery
- 1900/2900 Firmware IOS Upgrade
- Spanning Tree Protocol
- Redundant Topology
- Redundant Topologies. Redundant Switched Topologies
- Broadcast Storms. Multiple Frame Transmissions.
- MAC Database Instability. Spanning Tree Overview
- Spanning-Tree Operation. Using Spanning Tree to Create a Loop-Free Topology
- Advanced Functions of STP. Selecting the Root Bridge
- Stages of Spanning-Tree Port States
- Electing Designated Ports. Path Cost
- STP Timers. Spanning-Tree Recalculation
- Convergence. RSTP. RSTP Port States. Transition to Forwarding
- Virtual LANs
- VLAN. Broadcast Domains with VLANs and Routers
- VLAN Operation. End-to-End VLANs
- Geographic VLANS. Benefits of VLANs.
- Change Management. VLANs and Security.
- VLAN Frame Identification. IEEE 802.1Q: Frame Tagging
- Inter-Switch Link Protocol. FDDI 802.10
- LANE. VLAN Configuration. Configuring Static VLANs
- Verifying VLAN Configuration. Saving a VLAN Configuration
- Deleting a VLAN Configuration. Troubleshooting VLANs
- VLAN Trunking Protocol
- Trunking. Concepts. Operation. VLANs and Trunking
- Switch Command-Line Interfaces. Trunking Implementation
- VLAN Trunking Protocol (VTP). VTP Concepts, Benefits, Domain, Modes, Implementation Configuration and Pruning
- Inter-VLAN Routing, Issues and Solutions.
- Isolated Broadcast Domains., Finding the Route Between VLANs
- Physical and Logical Interfaces. Dividing Physical Interfaces into Subinterfaces
- Configuring Inter-VLAN Routing
- WAN TECHNOLOGIES
- Scaling IP Addresses. Internet Protocol Overview
- NAT and PAT. NAT and PAT Features
- Configuring NAT and PAT. Verifying NAT and PAT Configuration
- Troubleshooting NAT and PAT Configuration
- Advantages and Disadvantages of NAT
- DHCP Overview. BOOTP and DHCP Differences
- Configuring DHCP Operation. Verifying DHCP Operation.
- Troubleshooting DHCP Configuration. DHCP Relay.
- WAN Technologies Overview.
- WAN Devices. WAN Standards. WAN Encapsulation. WAN Link Options.
- Circuit-Switched Connections. Packet-Switched Connections.
- Packet and Circuit Switching. WAN Technologies
- Analog Dialup. ISDN. Leased Line. X.25. Frame Relay. ATM. DSL
- Cable Modem. WAN Communication
- LAN/WAN Integration. Identifying and Selecting Network Capabilities
- Identifying and Selecting a Networking Model. The Hierarchical Network Design Model
- The Three-Layer Design Models. Three-Layer Model Components.
- Hierarchical WAN Design Advantages. Server Placement.
- WAN Design. Steps in Designing a WAN. Gathering Requirements.
- Analyzing Requirements. Sensitivity Testing.
- WAN Topology
- Point-to-Point Protocol
- PPP Layered Architecture. Establishing a PPP Session.
- PPP Layered Architecture. Establishing a PPP Session.
- PPP Authentication Protocols. Password Authentication Protocol. CHAP.
- PPP Encapsulation and Authentication Process
- Serial Point-to-Point Links. Time-Division Multiplexing
- Demarcation Point. DTE and Data Communications Equipment Devices
- HDLC Encapsulation. Configuring HDLC Encapsulation
- Troubleshooting a Serial Interface. Configuring PPP.
- Configuring PPP Encapsulation. Configuring PPP Authentication
- Verifying the Serial PPP Encapsulation Configuration
- Troubleshooting the Serial PPP Encapsulation Configuration
- ISDN and DDR.
- ISDN Standards. ISDN Overview. ISDN Standards and Access Methods
- ISDN 3-Layer Model and Protocols
- ISDN Call Setup. ISDN Functions and Reference Points
- Determining the Router ISDN Interface. ISDN Switch Types. ISDN Configuration
- Configuring ISDN BRI. Configuring ISDN PRI
- Verifying the ISDN Configuration. Troubleshooting the ISDN Configuration
- DDR Routing. DDR Operation. Legacy DDR. Defining Static Routes for DDR
- Specifying Interesting Traffic for DDR. Configuring DDR Dialer Information
- Frame Relay
- Frame Relay Overview. Frame Relay Terminology. Frame Relay Operation. Frame Relay LMI
- LMI Operations. LMI Extensions. Global Addressing. Multicasting. Inverse ARP
- Stages of Inverse ARP and LMI Operation. Frame Relay Mapping. Frame Relay Switching Tables
- Frame Relay Operation. Frame Relay Subinterfaces. Split Horizon Routing Environments
- Resolving Reachabilty Issues with Subinterfaces
- Basic Frame Relay Configuration. Configuring the Serial Interface
- Verifying the Serial Interface Configuration. Verifying Operation and Confirming Connectivity
- Confirming That the Line Is Up. Confirming the Frame Relay Maps
- Confirming Connectivity to the Central Site Router
- Configuring Subinterfaces. Configuring Optional Commands
- Introduction to Network Administration
- Overview of Desktop and Server Operating Systems
- Workstations. Servers. Client/Server Relationship
- NOSs. Windows NT, Windows 2000, and Windows .NET
- UNIX and Linux. Macintosh OS X. Concept of Service on Servers
- File Sharing. FTP and File Transfer. Web Services
- DNS. DHCP. Network Management. OSI and Network Management Model
- Standards: SNMP and CMIP. SNMP Operation
- Structure of Management Information and MIBs
- SNMP Protocol. Configuring SNMP. RMON. Syslog
- Network Management
- Network Documentation
- Main Distribution Frame (MDF) and Intermediate Distribution Frame (IDF) Layouts
- Server and Workstation Configuration Details. Software Listings. Maintenance Records
- Security Measures. User Policies. Network Security. Data Recovery
- EMI and RFI. Software Viruses. Network Performance. Server Administration
- Client/Server Network. Network Control. The Administrative Side of Network Management
- Understanding and Establishing the Boundaries of the Network
- Costs of a Network. Error Report Documentation
- Monitoring the Network. Connection Monitoring
- Traffic Monitoring. SNMP. Remote Monitoring
- Network Troubleshooting. The Troubleshooting Process
- Troubleshooting Techniques. Software Tools
- Developing Network Security and Network Management Strategies
- Network Security Design. Identifying Network Assets and Analyzing Risks
- Analyzing Security Requirements and Trade-Offs
- Developing a Security Plan. Defining a Security Policy
- Components of a Security Policy. Developing Security Procedures
- Security Mechanisms. Authentication. Authorization.
- Accounting (Auditing). Data Encryption. Packet Filters. Firewalls
- Intrusion Detection. Physical Security. Selecting Security Solutions
- Securing the Internet Connection. Securing Internet Domain Name System Services
- Logical Network Design and the Internet Connection. IP Security Protocol
- Securing Dial-Up Access. Securing Network Services. Securing User Services
- Virtual Private Networks
- VPN Operation. VPN Advantages. Types of VPNs
- Service-Level Agreements. An Example VPN
- VPNs of Network A Sites. VPN Implementation. Security Audit. The Scope and Application Needs
- Documentation. Security Policy. VPN Design
- Tunneling Overview. Virtual Dial-Up Services. L2TP Implementation
- End-to-End Virtual Dial-Up Process. Highlights of Virtual Dial-Up Service
- Authentication and Security. Authorization. Address Allocation. Accounting