Chapter 1-10 Outlines

Outline:

Chapter 1: Overview of Scalable Networks
Chapter Overview 
1.1 The Hierarchical Network Design Model
1.1.1 The three-layer hierarchical design model
1.1.2 Router function in the hierarchy
1.1.3 Core layer example
1.1.4 Distribution layer example
1.1.5 Access layer example
1.2 Key Characteristics of Scalable Internetworks
1.2.1 Five characteristics of a scalable network
1.2.2 Making the network reliable and available
1.2.3 Making the network responsive
1.2.4 Making the network efficient, 1
1.2.5 Making the network efficient, 2
1.2.6 Making the network adaptable
1.2.7 Making the network accessible but secure
1.3 Case Study
1.3.1 The International Travel Agency
1.4 Basic Router Configuration Lab Exercises
1.4.1 Getting Started and Building Start.TXT
1.4.2 Capturing HyperTerminal and Telnet Sessions
1.4.3 Access Control List Basics and Extended Ping
1.5 Load Balancing Lab Exercises
1.5.1 Equal-Cost load balancing with RIP
1.5.2 Unequal-Cost load balancing with IGRP
Chapter Summary
Chapter Quiz 
Chapter 2: IP Addressing 
Chapter Review 
Chapter Overview 
2.1 IPv4 Addressing
2.1.1 Internet's address architecture
2.1.2 Classes of IP addresses
2.1.3 Classes of IP addresses (con't.)
2.1.4 Subnet masking
2.2 IP Addressing Crisis and Solutions
2.2.1 IP addressing crisis
2.2.2 Classless Interdomain Routing (CIDR)
2.2.3 Route aggregation and supernetting
2.2.4 Supernetting and address allocation
2.3 VLSM
2.3.1 Variable-Length Subnet Masks
2.3.2 Classless and classful routing protocols
2.4 Route Summarization
2.4.1 An overview of route summarization
2.4.2 Route flapping
2.5 Private addressing and NAT
2.5.1 Private IP addresses (RFC 1918)
2.5.2 Discontiguous subnets
2.5.3 Network Address Translation (NAT)
2.6 IP Unnumbered
2.6.1 Using IP unnumbered
2.7 DHCP and Easy IP
2.7.1 DHCP overview
2.7.2 DHCP operation
2.7.3 Configuring IOS DHCP server
2.7.4  Easy IP
2.8 Helper Addresses
2.8.1 Using helper addresses
2.8.2 Configuring IP helper addresses
2.8.3 IP helper address example
2.9 IPv6
2.9.1 IP address issues solutions
2.9.2 IPv6 address format
2.10 Advanced IP Addressing Management Lab Exercises
2.10.1 Configuring VLSM and IP Unnumbered
2.10.2 VLSM
2.10.3 Using DHCP and IP Helper Addresses
Chapter Summary
Chapter Quiz 
Chapter 3: Routing Overview
Chapter Review 
Chapter Overview 
3.1 Routing
3.1.1 Routing fundamentals
3.1.2 Static routing
3.1.3 Configuring dynamic routing
3.1.4 Distance-vector routing protocols
3.1.5 Link-state routing protocols
3.1.6 Hybrid routing: EIGRP
3.2 Default Routing
3.2.1 Default routing overview
3.2.2 Configuring static default routes
3.2.3 Default routing with IGRP
3.2.4 Default route caveats
3.3 Floating Static Routes
3.3.1 Configuring floating static routes
3.4 Convergence
3.4.1 Convergence issues
3.5 Route Calculation
3.5.1 Route calculation fundamentals
3.5.2 The initiation of routing updates
3.5.3 Routing metrics
3.6 Routing Process Configuration Lab Exercises
3.6.1 Migrating from RIP to EIGRP
3.6.2 Configuring IGRP
3.6.3 Configuring default routing with RIP and IGRP
3.6.4 Configuring floating static routes
Chapter Summary
Chapter Quiz 
Chapter 4: OSPF 
Chapter Review
Chapter Overview 
4.1 OSPF Overview
4.1.1 Issues addressed by OSPF
4.1.2 OSPF terminology
4.1.3 OSPF states
4.1.4 OSPF network types
4.1.5 The OSPF Hello protocol
4.2 OSPF Operation
4.2.1 Steps of OSPF operation
4.2.2 Step 1: Establish router adjacencies
4.2.3 Step 2: Elect a DR and a BDR
4.2.4 Step 3: Discover routes
4.2.5 Step 4: Select appropriate routes
4.2.6 Step 5: Maintain routing information
4.3 Configuring OSPF
4.3.1 Configuring OSPF on routers within a single area
4.3.2 Optional configuration commands
4.3.3 Optional configuration commands (con't.)
4.4 Configuring OSPF Over NBMA
4.4.1 NBMA overview
4.4.2 Full-Mesh Frame Relay
4.4.3 Partial-Mesh Frame Relay
4.4.4 Point-to-Multipoint OSPF
4.5 Verifying OSPF Operation
4.5.1 Show commands
4.5.2 Clear and debug commands
4.6 OSPF Configuration Lab Exercises
4.6.1 Configuring OSPF
4.6.2 Examining the DR/BDR election process
4.6.3 Configuring Point-to-Multipoint OSPF over Frame Relay
Chapter Summary
Chapter Quiz
Chapter 5: Multiarea OSPF
Chapter Review
Chapter Overview 
5.1 Multiple OSPF Areas
5.1.1 Creating multiple OSPF areas
5.1.2 OSPF router types
5.1.3 OSPF LSA and area types
5.2 Multiarea OSPF Operation
5.2.1 Configuring OSPF operation across multiple areas
5.2.2 Flooding LSUs to multiple areas
5.2.3 Updating the routing table
5.3 Multiarea OSPF Configuration
5.3.1 Using and configuring OSPF multiarea components
5.3.2 Configuring OSPF route summarization
5.4 Stub and Totally Stubby Areas
5.4.1 Using stub and totally stubby areas
5.4.2 Stub and totally stub area criteria
5.4.3 Configuring stub and totally stubby areas
5.4.4 OSPF stub area configuration example
5.4.5 OSPF totally stubby configuration example
5.5 Virtual Links
5.5.1 Meeting the backbone area requirements
5.5.2 Configuring virtual links
5.5.3 Virtual link configuration example
5.6 Not-So-Stubby Areas
5.6.1 NSSA overview
5.6.2 How NSSA operates
5.7 Monitoring Multiarea OSPF
5.7.1 Verifying multiarea OSPF operation
5.8 OSPF Verification and Configuration Lab Exercises
5.8.1 Multiarea OSPF 
5.8.2 Configuring a stub area and a totally stubby area
5.8.3 Configuring an NSSA
5.8.4 Configuring virtual links
5.9 Creating Multiarea OSPF Challenge Lab
5.9.1 Creating multiarea OSPF
Chapter Summary
Chapter Quiz
Chapter 6: EIGRP
Chapter Review
Chapter Overview 
6.1 EIGRP Fundamentals
6.1.1 EIGRP and IGRP compatibility
6.1.2 EIGRP design
6.1.3 EIGRP support for Novell IPX and AppleTalk
6.1.4 EIGRP terminology
6.2 EIGRP Features
6.2.1 EIGRP technologies
6.2.2 Neighbor discovery and recovery
6.2.3 Reliable transport protocol
6.2.4 DUAL finite-state machine
6.2.5 Protocol-dependent modules
6.3 EIGRP Components
6.3.1 EIGRP packet types
6.3.2 EIGRP tables
6.3.3 EIGRP tables (con't.)
6.3.4 Route tagging with EIGRP
6.4 EIGRP Operation
6.4.1 Convergence using EIGRP
6.5 Configuring EIGRP
6.5.1 Configuring EIGRP for IP networks
6.5.2 EIGRP and the bandwidth command
6.5.3 The bandwidth-percent command
6.5.4 Configuring EIGRP for IPX networks
6.5.5 Controlling SAP updates
6.5.6 Summarizing EIGRP routes for IP
6.5.7 Summarizing EIGRP routes for IP
6.6 Monitoring EIGRP
6.6.1 Verifying EIGRP operation
6.7 EIGRP Configuration Lab Exercises
6.7.1 Configuring EIGRP with IGRP
6.7.2 Configuring EIGRP fault tolerance
6.8 Configuring EIGRP Challenge Lab Exercise
6.8.1 EIGRP challenge lab
Chapter Summary
Chapter Quiz
Chapter 7: Route Optimization
Chapter Review 
Chapter Overview 
7.1 Controlling Routing Updates
7.1.1 Controlling routing updates
7.1.2 Passive interfaces
7.1.3 Filtering routing updates with distribute-list
7.2 Policy Routing
7.2.1 Policy routing overview
7.2.2 Policy routing example
7.3 Route Redistribution
7.3.1 Redistribution overview
7.3.2 Redistribution overview (con't.)
7.3.3 Administrative distance
7.3.4  Modifying administrative distance by using the distance command
7.3.5  Redistribution guidelines
7.3.6  Configuring one-way redistribution
7.3.7  Configuring two-way redistribution
7.3.8  Redistributing connected and static routes
7.3.9  Verifying redistribution operation
7.4 Redistribution Example
7.4.1 Phase 1: Configuring a RIP network
7.4.2 Phase 2: Adding OSPF to the Core of a RIP Network
7.4.3 Phase 3: Adding OSPF areas
7.5 Route Optimization Configuration Lab Exercises
7.5.1 Configuring distribute lists and passive interfaces
7.5.2 Configuring route maps
7.5.3 Redistributing RIP and OSPF
7.6 Route Optimization Challenge Lab Exercise
7.6.1 Route optimization challenge lab
Chapter Summary
Chapter Quiz 
Chapter 8: BGP
Chapter Review 
Chapter Overview 
8.1 Autonomous Systems
8.1.1 Overview of autonomous systems
8.1.2 Single-homed autonomous systems
8.1.3 Multihomed nontransit autonomous systems
8.1.4 Multihomed transit autonomous systems
8.1.5 When not to use BGP
8.2 BGP Basic Operations
8.2.1 BGP routing updates
8.2.2 BGP neighbors
8.2.3 BGP message types
8.2.4 BGP neighbor negotiation
8.2.5 Network-layer reachability information (NLRI)
8.2.6 Path attributes
8.3 Configuring BGP 
8.3.1 Basic BGP configuration
8.3.2 EBGP and IBGP
8.3.3 EBGP and IBGP configuration example
8.3.4  EBGP multihop
8.3.5 Clearing the BGP table
8.3.6 Peering
8.3.7 How to maintain BGP continuity inside an AS
8.3.8 Synchronization within an AS
8.4 Monitoring BGP operation
8.4.1 Verifying BGP operation
8.5 The BGP Routing Process
8.5.1 An overview of the BGP routing process
8.5.2 The BGP routing process model
8.5.3 Implementing BGP routing policy
8.6 BGP Attributes
8.6.1 Controlling BGP routing with attributes
8.6.2 The Next Hop attribute
8.6.3 Next Hop behavior on multiaccess media
8.6.4 Next Hop behavior on NBMA networks
8.6.5 The AS_Path attribute
8.6.6 AS_Path and private AS numbers
8.6.7 Manipulating routes with AS_Path
8.6.8 The Atomic Aggregate attribute
8.6.9 The Aggregator attribute
8.6.10 The Local Preference attribute
8.6.11 Manipulating Local Preference
8.6.12 The Weight attribute
8.6.13 The Multiple Exit Discriminator attribute
8.6.14 MED configuration example
8.6.15 The Origin attribute
8.7 The BGP Decision Process
8.7.1 The BGP decision process
8.8 BGP Configuration Lab Exercises
8.8.1 Configuring BGP
8.8.2 Configuring IBGP and EBGP sessions
8.8.3 Using the AS_PATH attribute
8.8.4 Using the LOCAL_PREF and MED attributes
Chapter Summary
Chapter Quiz 
Chapter 9: Scaling BGP 
Chapter Review 
Chapter Overview 
9.1 Route Reflectors
9.1.1 Route Reflector Basics
9.1.2 Internal peers without Route Reflectors
9.1.3 Internal peers with Route Reflectors
9.1.4 Route reflector operation
9.2 BGP Route Filtering and Policy Routing
9.2.1 BGP route filtering
9.2.2 Using filters to implement routing policy
9.2.3 Using distribute-list to filter BGP routes
9.2.4 The ip prefix-list command
9.2.5 Example ip prefix-list configuration
9.3 The Community Attribute
9.3.1 Community attribute overview
9.3.2 Community attribute configuration example
9.4 Peer Groups
9.4.1 Overview of peer groups
9.4.2 Peer group configuration example
9.5 Redundancy, Symmetry, and Load Balancing
9.5.1 Issues with redundancy, symmetry, and load balancing
9.5.2 Redundancy
9.5.3 Default routing in BGP networks
9.5.4 Symmetry
9.5.5 Load balancing
9.5.6 Redundancy, symmetry, and load balancing in a single-homed AS
9.5.7 Multihomed connections
9.6 BGP Redistribution
9.6.1 BGP redistribution overview
9.6.2 Injection of unwanted or faulty information
9.6.3 Injecting information statically into BGP
9.6.4 BGP redistribution configuration example
9.7 Scaling BGP Lab Exercises
9.7.1 BGP route relectors and route filters
9.7.2 The BGP COMMUNITIES attribute
9.7.3 BGP peer groups
9.8 Configuring BGP Challenge Lab Exercise
9.8.1 BGP challenge lab
Chapter Summary
Chapter Quiz 
Chapter 10: Security
Chapter Review 
Chapter Overview 
10.1 Access Lists
10.1.1 Standard and extended access lists syntax
10.1.2 Named access list syntax
10.1.3 Time-based extended access list syntax
10.1.4 Configuring access list descriptions with the remark command
10.1.5 Syntax for applying access lists
10.2 Securing Router Access
10.2.1 Using access lists to secure virtual terminal access
10.2.2 Using access lists to secure access to the IOS web interface
10.3 Dynamic Access Lists: Lock-and-Key
10.3.1 Lock-and-key overview
10.3.2 Lock-and-key operation
10.3.3 Configuring lock-and-key
10.3.4 Configuring lock-and-key authentication
10.4 Session Filtering
10.4.1 Using extended access lists with the established argument
10.4.2 Reflexive access lists
10.4.3 How reflexive access lists work
10.4.4  Restrictions on using reflexive access lists
10.4.5 Configuring reflexive access lists
10.4.6 Reflexive access list configuration example
10.5 Context-Based Access Control
10.5.1 Context-Based Access Control (CBAC)
10.5.2 CBAC operation
10.5.3 When and where to configure CBAC
10.5.4 Choosing an interface
10.5.5 Defining CBAC inspection rules
10.5.6 Configuring global timeouts
10.5.7 Verifying CBAC
10.5.8 A CBAC configuration example
10.6 Using an Alternative to Access Lists
10.6.1 The Null 0 interface
10.7 Configuring Router Security Lab Exercises
10.7.1 Lock-and-key
10.7.2 Reflexive access lists
10.7.3 CBAC
Chapter Summary
Chapter Quiz