WAN Administration

Comments Off
Home » WAN Administration

Router Networking  validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN. The curriculum includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. This new curriculum also includes (but is not limited to) the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),LANs, Ethernet, access control lists (ACLs).

COURSE SYLLABUS

Introduction to Networking.
Connecting to the Internet. Network Math.
Networking Fundamentals.
Networking Terminology. Bandwidth. Networking Models.
Networking Media.
Copper Media. Optical Media. Wireless Media.
Cabling Testing.
Frequency-Based Cable Testing. Signals and Noise.
Cabling LANs and WANs.
Cabling LANs. Cabling WANs.
Ethernet Fundamentals.
Ethernet Fundamentals. Ethernet Operation.
Ethernet Technologies.
10-Mbps and 100-Mbps Ethernet. Gigabit and 10-Gigabit Ethernet. Check Your Understanding
Ethernet Switching.
Ethernet Switching. Collision Domains and Broadcast Domains.
TCP/IP Protocol Suite and IP Addressing.
Introduction to TCP/IP. Internet Addresses. Obtaining an IP Address.
Routing Fundamentals and Subnets.
Routed Protocol. IP Routing Protocols. The Mechanics of Subnetting.
TCP/IP Transport and Application Layers.
TCP/IP Transport Layer. The Application Layer.
WANs and Routers.
WANs. Routers.
Introduction to Routers.
Operating  IOS Software. Starting a Router.
Configuring a Router.
Configuring a Router. Finishing the Configuration.
Learning About Other Devices.
Discovering and Connecting to Neighbors. Getting Information About Remote Devices.
Managing  IOS Software.
Router Boot Sequence and Verification. Managing the File System.
Routing and Routing Protocols.
Introduction to Static Routing. Dynamic Routing Overview. Routing Protocols Overview.
Distance Vector Routing Protocols.
Distance Vector Routing. RIP. IGRP.
TCP/IP Suite Error and Control Messages.
Overview of TCP/IP Error Messages. Overview of TCP/IP Suite Control Messages.
Basic Router Troubleshooting.
Examining the Routing Table. Network Testing. Troubleshooting Router Issues Overview.
Intermediate TCP/IP.
TCP Operation. Overview of Transport Layer Ports.
Access Control Lists (ACLs).
Access Control List Fundamentals. Access Control Lists.
The OSI Reference Model and Routing.
Layered Network Model: OSI Reference Model.
Peer-to-Peer Communication. Data Encapsulation.
Physical Layer. Ethernet/802.3 Physical Connections.
Data Link Layer. Ethernet/802.3 Interface.
Network Layer. IP Addressing and Subnets.
Path Determination. Path Communication.
ICMP. ARP. Routing. Routed Versus Routing Protocols.
IP Routing Configuration Tasks. Transport Layer.
Segmenting Upper-Layer Applications.
Establishing a Connection. Data Transfer.
Reliability with Windowing. Acknowledgment Techniques.
SWITCHING BASICS AND INTERMEDIATE ROUTING.
Classless Routing.
Route Aggregation and Supernetting.
Supernetting and Address Allocation.
Variable-Length Subnet Masking (VLSM).
VLSM Features. Calculating VLSMs.
Configuring VLSM. VLSM Using RIP and IGRP.
Route Summarization. Summarization Within an Octet.
Summarization with a Discontiguous Network.
Route Flapping. RIP Version 2.
Short History of RIP. RIP Version 2 Features.
Comparing RIPv1 and RIP v2. Configuring RIP Version 2.
Verifying RIP V2. Troubleshooting RIP. Default Routes.
Single-Area OSPF.
Single-Area OSPF Concepts.
OSPF Terminology. OSPF States.
Comparing OSPF with Distance Vector Routing Protocols.
Shortest Path First Algorithm. OSPF Network Types
OSPF Hello Protocol. Steps in OSPF Operations.
Establishing a Router Adjacency. Electing a DR and BDR.
Discovering Routes. Selecting the Best Route.
Maintaining Route Information. Single-Area OSPF Configuration.
Configuring a Loopback Address. Modifying OSPF Router Priority.
Modifying OSPF Cost Metric. Configuring OSPF Authentication.
Configuring OSPF Timers. Configure OSPF over NBMA.
Full-Mesh Frame Relay. Partial-Mesh Frame Relay.
Point-to-Multipoint OSPF. Propagating a Default Route.
Common OSPF Configuration Issues. Verifying the OSPF Configuration.
Enhanced Interior Gateway Routing Protocol.
EIGRP Processes and Technology.
Independence from Routed Protocols. EIGRP Terminology.
Neighbour Table. Topology Table.
Successor. Feasible Successor.
Selection of Successors and Feasible Successors.
Stuck in Active Routes. Routing Table.
Route Tagging. EIGRP Features and Technologies.
Neighbor Discovery and Recovery.
Reliable Transport Protocol. DUAL Finite-State Machine.
PDMs. EIGRP Packet Types.
Hello Packets. Acknowledgment Packets.
Update Packets. Query and Reply Packets.
EIGRP Convergence. Configuring EIGRP.
Configuring EIGRP for IP. Configuring Bandwidth with NBMA.
Configuring Bandwidth over a Multipoint Network.
Configuring Bandwidth over a Hybrid Multipoint Network.
Using the ip bandwidth-percent Command.
Configuring EIGRP Summarization.
Switching Concepts and LAN Design.
Ethernet/802.3 LANs. Ethernet/802.3 LAN Development.
Factors That Impact Network Performance.
Elements of Ethernet/802.3 Networks.
Half-Duplex Ethernet Networks. Full-Duplex Ethernet Networks.
Introduction to LAN Switching. LAN Segmentation.
LAN Segmentation with Bridges. LAN Segmentation with Routers.
LAN Segmentation with Switches. The Basic Operations of a Switch.
Ethernet Switch Latency. Layer 2 and Layer 3 Switching.
Implications of Layer 2 and Layer 3 Switching.
Symmetric and Asymmetric Switching.
Memory Buffering.
LAN Design. LAN Design Considerations.
Function and Placement of Servers.
Segmentation Issues. Broadcast Domain Issues.
LAN Design Methodology. Factors That Affect Network Availability.
Designing the Physical Network Topology.
Layer 1 Design. Layer 2 Design. Layer 3 Design.
Basic Layer 2 Bridging and Switching.
How Switches and Bridges Filter Frames.
Filtering Types.
Switches.
Overview of Switches. Starting the Switch.
Physical Startup of the Catalyst Switch.
Switch LED Indicators. Verifying Port LEDs During Switch POST.
Viewing Initial Bootup Output from the Switch.
Examining Help in the Switch Command-Line Interface.
LAN Switches and Hierarchical Network Design.
The Core Layer. The Distribution Layer.
Access Layer. Switched LANs, Access Layer Overview.
Access Layer Switches. Distribution Layer Overview.
Distribution Layer Switches. Core Layer Overview.
Core Layer Switches.
Switch Configuration.
Microsegmentation. Microsegmentation Implementation.
How a Switch Learns Addresses. Switch Forwarding.
Store-and-Forward. Cut-Through. Symmetric Switching.
Asymmetric Switching. Memory Buffering.
Switches and Collision Domains. Switches and Broadcast Domains.
Communication Between Switches and PCs.
PC to Switch Transmission. Communication Between Switches.
Verifying the Initial Configuration of a Catalyst Switch.
Verifying the Catalyst Switch Default Configuration.
Switch Port Properties. VLAN Properties.
The Flash Directory. Displaying IOS Version Information.
Benefits of Using the Default Configuration.
Configuring the Network Settings of the Catalyst Switch.
Resetting the Switch Defaults.
Assigning the Switch Host Name and Passwords.
Assigning the Switch IP Address and Default Gateway.
Setting Port Characteristics. Web-Based Interface.
Managing the MAC Address Table.
Configuring Static MAC Addresses.
Configuring Port Security. Executing Adds, Moves, and Changes.
Managing Switch Operating System Images and Device Configuration Files.
1900/2950 Password Recovery.
1900/2900 Firmware IOS Upgrade.
Spanning Tree Protocol.
Redundant Topology.
Redundant Topologies. Redundant Switched Topologies.
Broadcast Storms. Multiple Frame Transmissions.
MAC Database Instability. Spanning Tree Overview.
Spanning-Tree Operation. Using Spanning Tree to Create a Loop-Free Topology.
Advanced Functions of STP. Selecting the Root Bridge.
Stages of Spanning-Tree Port States.
Electing Designated Ports. Path Cost.
STP Timers. Spanning-Tree Recalculation.
Convergence. RSTP. RSTP Port States. Transition to Forwarding.
Virtual LANs.
VLAN. Broadcast Domains with VLANs and Routers.
VLAN Operation. End-to-End VLANs.
Geographic VLANS. Benefits of VLANs.
Change Management. VLANs and Security.
Using Hubs with VLANs. VLAN Types.
VLAN Frame Identification. IEEE 802.1Q: Frame Tagging.
Inter-Switch Link Protocol. FDDI 802.10.
LANE. VLAN Configuration. Configuring Static VLANs.
Verifying VLAN Configuration. Saving a VLAN Configuration.
Deleting a VLAN Configuration. Troubleshooting VLANs.
VLAN Trunking Protocol.
Trunking. Concepts. Operation. VLANs and Trunking.
Switch Command-Line Interfaces. Trunking Implementation.
VLAN Trunking Protocol (VTP). VTP Concepts, Benefits, Domain, Modes, Implementation Configuration and Pruning. Inter-VLAN Routing, Issues and Solutions.
Isolated Broadcast Domains., Finding the Route Between VLANs.
Physical and Logical Interfaces. Dividing Physical Interfaces into Subinterfaces.
Configuring Inter-VLAN Routing.
WAN TECHNOLOGIES.
Scaling IP Addresses. Internet Protocol Overview.
NAT and PAT. NAT and PAT Features.
Configuring NAT and PAT. Verifying NAT and PAT Configuration.
Troubleshooting NAT and PAT Configuration.
Advantages and Disadvantages of NAT.
DHCP Overview. BOOTP and DHCP Differences.
DHCP Features. DHCP Operation.
Configuring DHCP Operation. Verifying DHCP Operation.
Troubleshooting DHCP Configuration. DHCP Relay.
WAN Technologies Overview.
WAN Devices. WAN Standards. WAN Encapsulation. WAN Link Options.
Circuit-Switched Connections. Packet-Switched Connections.
Packet and Circuit Switching. WAN Technologies.
Analog Dialup. ISDN. Leased Line. X.25. Frame Relay. ATM. DSL.
Cable Modem. WAN Communication.
LAN/WAN Integration. Identifying and Selecting Network Capabilities.
Identifying and Selecting a Networking Model. The Hierarchical Network Design Model.
The Three-Layer Design Models. Three-Layer Model Components.
Hierarchical WAN Design Advantages. Server Placement.
WAN Design. Steps in Designing a WAN. Gathering Requirements.
Analyzing Requirements. Sensitivity Testing.
WAN Topology.
Point-to-Point Protocol.
PPP Layered Architecture. Establishing a PPP Session.
PPP Authentication Protocols. Password Authentication Protocol. CHAP.
PPP Encapsulation and Authentication Process.
Serial Point-to-Point Links. Time-Division Multiplexing.
Demarcation Point. DTE and Data Communications Equipment Devices.
HDLC Encapsulation. Configuring HDLC Encapsulation.
Troubleshooting a Serial Interface. Configuring PPP.
Configuring PPP Encapsulation. Configuring PPP Authentication.
Verifying the Serial PPP Encapsulation Configuration.
Troubleshooting the Serial PPP Encapsulation Configuration.
ISDN and DDR.
ISDN Standards. ISDN Overview. ISDN Standards and Access Methods.
ISDN 3-Layer Model and Protocols.
ISDN Call Setup. ISDN Functions and Reference Points.
Determining the Router ISDN Interface. ISDN Switch Types. ISDN Configuration.
Configuring ISDN BRI. Configuring ISDN PRI.
Verifying the ISDN Configuration. Troubleshooting the ISDN Configuration.
DDR Routing. DDR Operation. Legacy DDR. Defining Static Routes for DDR.
Specifying Interesting Traffic for DDR. Configuring DDR Dialer Information.
Dialer Profiles. Configuring Dialer Profiles. Verifying the DDR Configuration.
Frame Relay.
Frame Relay Overview. Frame Relay Terminology. Frame Relay Operation. Frame Relay LMI.
LMI Operations. LMI Extensions. Global Addressing. Multicasting. Inverse ARP.
Stages of Inverse ARP and LMI Operation. Frame Relay Mapping. Frame Relay Switching Tables.
Frame Relay Operation. Frame Relay Subinterfaces. Split Horizon Routing Environments.
Resolving Reachabilty Issues with Subinterfaces.
Basic Frame Relay Configuration. Configuring the Serial Interface.
Verifying the Serial Interface Configuration. Verifying Operation and Confirming Connectivity.
Confirming That the Line Is Up. Confirming the Frame Relay Maps.
Confirming Connectivity to the Central Site Router.
Configuring Subinterfaces. Configuring Optional Commands.
Introduction to Network Administration.
Overview of Desktop and Server Operating Systems.
Workstations. Servers. Client/Server Relationship.
NOSs. Windows NT, Windows 2000, and Windows .NET.
UNIX and Linux. Macintosh OS X. Concept of Service on Servers.
File Sharing. FTP and File Transfer. Web Services.
DNS. DHCP. Network Management. OSI and Network Management Model.
Standards: SNMP and CMIP. SNMP Operation.
Structure of Management Information and MIBs.
SNMP Protocol. Configuring SNMP. RMON. Syslog.
Network Management.
Network Documentation.
Main Distribution Frame (MDF) and Intermediate Distribution Frame (IDF) Layouts.
Server and Workstation Configuration Details. Software Listings. Maintenance Records.
Security Measures. User Policies. Network Security. Data Recovery.
Backup Operations. Redundancy Techniques. Environmental Factors. Power Conditioning.
EMI and RFI. Software Viruses. Network Performance. Server Administration.
Client/Server Network. Network Control. The Administrative Side of Network Management.
Understanding and Establishing the Boundaries of the Network.
Costs of a Network. Error Report Documentation.
Monitoring the Network. Connection Monitoring.
Traffic Monitoring. SNMP. Remote Monitoring.
Network Troubleshooting. The Troubleshooting Process.
Troubleshooting Techniques. Software Tools.
Developing Network Security and Network Management Strategies.
Network Security Design. Identifying Network Assets and Analyzing Risks.
Analyzing Security Requirements and Trade-Offs.
Developing a Security Plan. Defining a Security Policy.
Components of a Security Policy. Developing Security Procedures.
Security Mechanisms. Authentication. Authorization.
Accounting (Auditing). Data Encryption. Packet Filters. Firewalls.
Intrusion Detection. Physical Security. Selecting Security Solutions.
Securing the Internet Connection. Securing Internet Domain Name System Services.
Logical Network Design and the Internet Connection. IP Security Protocol.
Securing Dial-Up Access. Securing Network Services. Securing User Services.
Virtual Private Networks.
VPN Operation. VPN Advantages. Types of VPNs.
Service-Level Agreements. An Example VPN.
VPNs of Network A Sites. VPN Implementation. Security Audit. The Scope and Application Needs.
Documentation. Security Policy. VPN Design.
Tunneling Overview. Virtual Dial-Up Services. L2TP Implementation.
End-to-End Virtual Dial-Up Process. Highlights of Virtual Dial-Up Service.
Authentication and Security. Authorization. Address Allocation. Accounting.


Comments are closed.