CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram

Paperback Engels 2022 9780136891932
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram delivers expert coverage and practice questions for every exam topic, including implementation of core enterprise network technologies involving dual stack (IPv4 and IPv6) architecture, virtualization, infrastructure, network assurance, security and automation. It also offers comprehensive, proven preparation tools, including: Exam objective mapping to help students focus their study A self-assessment section for evaluating students' motivations and readiness Concise, easy-to-read exam topic overviews Exam Alerts that highlight key concepts Bullet lists and summaries for easy review Cram Savers, Cram Quizzes, and chapter-ending practice questions to help students assess their understanding Notes indicating areas of concern or specialty training Tips to help students build a better foundation of knowledge An extensive Glossary of terms and acronyms The popular Cram Sheet tear-out, collecting the most difficult-to-remember facts and numbers students should memorize before taking the test

Complementing all these study tools is the powerful Pearson IT Certification Practice Test software, with hundreds of exam-realistic practice questions. This assessment software offers students a wealth of customization option and reporting features, allowing them to test their knowledge in study mode, practice exam mode, or flash card mode.

Specificaties

ISBN13:9780136891932
Taal:Engels
Bindwijze:paperback
Serie:Exam Cram

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<div> &nbsp; &nbsp; Introduction. . . . . . . . . . . . . . . . . . . . . . . xxiii </div> <div> <br> </div> <div> Part I: Infrastructure </div> <div> <br> </div> <div> CHAPTER 1 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding Layer 2.. . . . . . . . . . . . . . . . . . . . 1 </div> <div> <br> </div> <div> &nbsp; &nbsp; VLANs Overview.. . . . . . . . . . . . . . . . . . . . 3 </div> <div> <br> </div> <div> &nbsp; &nbsp; Spanning Tree Protocol Overview. . . . . . . . . . . . . . 19 </div> <div> <br> </div> <div> &nbsp; &nbsp; EtherChannels.. . . . . . . . . . . . . . . . . . . . 47 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 57 </div> <div> <br> </div> <div> &nbsp; &nbsp; &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 58 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 58 </div> <div> <br> </div> <div> CHAPTER 2 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding Layer 3: IGPs.. . . . . . . . . . . . . . . . . 59 </div> <div> <br> </div> <div> &nbsp; &nbsp; IP Routing Essentials. . . . . . . . . . . . . . . . . . 60 </div> <div> <br> </div> <div> &nbsp; &nbsp; Enhanced Interior Gateway Routing Protocol (EIGRP). . . . . . 68 </div> <div> <br> </div> <div> &nbsp; &nbsp; Open Shortest Path First (OSPF).. . . . . . . . . . . . . . 80 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 100 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 101 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 101 </div> <div> <br> </div> <div> CHAPTER 3 </div> <div> <br> </div> <div> &nbsp; &nbsp; Understanding Layer 3: BGP. . . . . . . . . . . . . . . . . 103 </div> <div> <br> </div> <div> &nbsp; &nbsp; BGP Fundamentals.. . . . . . . . . . . . . . . . . . . 104 </div> <div> <br> </div> <div> &nbsp; &nbsp; BGP Configuration and Verification.. . . . . . . . . . . . . 112 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 120 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 121 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 121 </div> <div> <br> </div> <div> CHAPTER 4 </div> <div> <br> </div> <div> &nbsp; &nbsp; IP Services.. . . . . . . . . . . . . . . . . . . . . . . 123 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network Time Protocol (NTP).. . . . . . . . . . . . . . 124 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network Address Translation (NAT).. . . . . . . . . . . . . 134 </div> <div> <br> </div> <div> &nbsp; &nbsp; First-Hop Redundancy Protocols (FHRPs). . . . . . . . . . . 143 </div> <div> <br> </div> <div> &nbsp; &nbsp; Multicast.. . . . . . . . . . . . . . . . . . . . . . 156 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 165 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 166 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 166 </div> <div> <br> </div> <div> CHAPTER 5 </div> <div> <br> </div> <div> &nbsp; &nbsp; Enterprise Wireless.. . . . . . . . . . . . . . . . . . . . 167 </div> <div> <br> </div> <div> &nbsp; &nbsp; Wireless Basics.. . . . . . . . . . . . . . . . . . . . 168 </div> <div> <br> </div> <div> &nbsp; &nbsp; &nbsp; &nbsp; WLC and AP Operation and Pairing. . . . . . . . . . . . . 176 </div> <div> <br> </div> <div> &nbsp; &nbsp; Wireless Roaming. . . . . . . . . . . . . . . . . . . 185 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 191 </div> <div> <br> </div> <div> &nbsp; &nbsp; &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 192 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 192 </div> <div> <br> </div> <div> Part II: Security </div> <div> <br> </div> <div> CHAPTER 6 </div> <div> <br> </div> <div> &nbsp; &nbsp; Device Access Control.. . . . . . . . . . . . . . . . . . . 193 </div> <div> <br> </div> <div> &nbsp; &nbsp; Cisco IOS CLI Session Overview.. . . . . . . . . . . . . . 194 </div> <div> <br> </div> <div> &nbsp; &nbsp; Authentication, Authorization, and Accounting (AAA) Overview.. . . 210 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 217 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 218 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 218 </div> <div> <br> </div> <div> CHAPTER 7 </div> <div> <br> </div> <div> &nbsp; &nbsp; Infrastructure Security.. . . . . . . . . . . . . . . . . . . 219 </div> <div> <br> </div> <div> &nbsp; &nbsp; Access Control Lists (ACLs) Overview. . . . . . . . . . . . 220 </div> <div> <br> </div> <div> &nbsp; &nbsp; Control Plane Policing (CoPP). . . . . . . . . . . . . . . 233 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 236 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 237 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 237 </div> <div> <br> </div> <div> CHAPTER 8 </div> <div> <br> </div> <div> &nbsp; &nbsp; Securing REST APIs. . . . . . . . . . . . . . . . . . . . 239 </div> <div> <br> </div> <div> &nbsp; &nbsp; REST API Security.. . . . . . . . . . . . . . . . . . . 240 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 245 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 245 </div> <div> <br> </div> <div> &nbsp; &nbsp; &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 245 </div> <div> <br> </div> <div> CHAPTER 9 </div> <div> <br> </div> <div> &nbsp; &nbsp; Wireless Security.. . . . . . . . . . . . . . . . . . . . . 247 </div> <div> <br> </div> <div> &nbsp; &nbsp; Wireless Authentication Overview. . . . . . . . . . . . . . 248 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 262 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 262 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 263 </div> <div> <br> </div> <div> CHAPTER 10 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network Security Design.. . . . . . . . . . . . . . . . . . 265 </div> <div> <br> </div> <div> &nbsp; &nbsp; Threat Defense. . . . . . . . . . . . . . . . . . . . 266 </div> <div> <br> </div> <div> &nbsp; &nbsp; TrustSec, MACsec. . . . . . . . . . . . . . . . . . . 279 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 284 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 285 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 285 </div> <div> <br> </div> <div> CHAPTER 11 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network Access Control. . . . . . . . . . . . . . . . . . . 287 </div> <div> <br> </div> <div> &nbsp; &nbsp; Cisco Identity Services Engine (ISE).. . . . . . . . . . . . . 288 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 296 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 296 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 297 </div> <div> <br> </div> <div> Part III: Automation </div> <div> <br> </div> <div> CHAPTER 12 </div> <div> <br> </div> <div> &nbsp; &nbsp; Anatomy of Python. . . . . . . . . . . . . . . . . . . . . 299 </div> <div> <br> </div> <div> &nbsp; &nbsp; Interpreting Python Components and Scripts.. . . . . . . . . . 300 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 313 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 314 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 314 </div> <div> <br> </div> <div> CHAPTER 13 </div> <div> <br> </div> <div> &nbsp; &nbsp; Building JSON Files.. . . . . . . . . . . . . . . . . . . . 315 </div> <div> <br> </div> <div> &nbsp; &nbsp; Data Formats (XML and JSON).. . . . . . . . . . . . . . 316 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 323 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 324 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 324 </div> <div> <br> </div> <div> CHAPTER 14 </div> <div> <br> </div> <div> &nbsp; &nbsp; YANG Data Modeling.. . . . . . . . . . . . . . . . . . . . 325 </div> <div> <br> </div> <div> &nbsp; &nbsp; YANG Data Modeling. . . . . . . . . . . . . . . . . . 326 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 332 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 332 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 332 </div> <div> <br> </div> <div> CHAPTER 15 </div> <div> <br> </div> <div> &nbsp; &nbsp; DNA Center and vManage APIs. . . . . . . . . . . . . . . . 333 </div> <div> <br> </div> <div> &nbsp; &nbsp; APIs for Cisco DNA Center and vManage.. . . . . . . . . . . 334 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 344 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 344 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 344 </div> <div> <br> </div> <div> CHAPTER 16 </div> <div> <br> </div> <div> &nbsp; &nbsp; Interpreting REST API Codes.. . . . . . . . . . . . . . . . . 345 </div> <div> <br> </div> <div> &nbsp; &nbsp; Interpreting REST API Response Codes.. . . . . . . . . . . 346 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 349 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 349 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 349 </div> <div> <br> </div> <div> CHAPTER 17 </div> <div> <br> </div> <div> &nbsp; &nbsp; EEM Applets.. . . . . . . . . . . . . . . . . . . . . . . 351 </div> <div> <br> </div> <div> &nbsp; &nbsp; Embedded Event Manager (EEM).. . . . . . . . . . . . . 352 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 362 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 362 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 362 </div> <div> <br> </div> <div> CHAPTER 18 </div> <div> <br> </div> <div> &nbsp; &nbsp; Configuration Management and Orchestration.. . . . . . . . . . 363 </div> <div> <br> </div> <div> &nbsp; &nbsp; Agent-Based Orchestration Tools.. . . . . . . . . . . . . . 365 </div> <div> <br> </div> <div> &nbsp; &nbsp; Agentless Orchestration Tools. . . . . . . . . . . . . . . 372 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 378 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 378 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 378 </div> <div> <br> </div> <div> Part IV: Architecture </div> <div> <br> </div> <div> CHAPTER 19 </div> <div> <br> </div> <div> &nbsp; &nbsp; Enterprise Network Design Principles.. . . . . . . . . . . . . . 379 </div> <div> <br> </div> <div> &nbsp; &nbsp; Hierarchical LAN Design Model.. . . . . . . . . . . . . . 380 </div> <div> <br> </div> <div> &nbsp; &nbsp; First-Hop Redundancy Protocols (FHRPs). . . . . . . . . . . 392 </div> <div> <br> </div> <div> &nbsp; &nbsp; Hardware Redundancy Mechanisms.. . . . . . . . . . . . . 400 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 407 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 408 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 408 </div> <div> <br> </div> <div> CHAPTER 20 </div> <div> <br> </div> <div> &nbsp; &nbsp; Wireless LAN Deployments. . . . . . . . . . . . . . . . . . 409 </div> <div> <br> </div> <div> &nbsp; &nbsp; Wireless Deployment Models. . . . . . . . . . . . . . . 410 </div> <div> <br> </div> <div> &nbsp; &nbsp; Wireless Location Services. . . . . . . . . . . . . . . . 427 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 430 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 431 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 431 </div> <div> <br> </div> <div> CHAPTER 21 </div> <div> <br> </div> <div> &nbsp; &nbsp; On-Premises vs. Cloud Infrastructure.. . . . . . . . . . . . . . 433 </div> <div> <br> </div> <div> &nbsp; &nbsp; Cloud Infrastructure Basics.. . . . . . . . . . . . . . . . 434 </div> <div> <br> </div> <div> &nbsp; &nbsp; Cloud Services Models. . . . . . . . . . . . . . . . . . 438 </div> <div> <br> </div> <div> &nbsp; &nbsp; Cloud Deployment Models.. . . . . . . . . . . . . . . . 444 </div> <div> <br> </div> <div> &nbsp; &nbsp; On-Premises or Cloud Infrastructure. . . . . . . . . . . . . 447 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 449 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 450 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 450 </div> <div> <br> </div> <div> CHAPTER 22 </div> <div> <br> </div> <div> &nbsp; &nbsp; SD-WAN.. . . . . . . . . . . . . . . . . . . . . . . . 451 </div> <div> <br> </div> <div> &nbsp; &nbsp; SD-WAN Overview.. . . . . . . . . . . . . . . . . . 452 </div> <div> <br> </div> <div> &nbsp; &nbsp; SD-WAN Architecture Components.. . . . . . . . . . . . . 459 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 465 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 466 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 466 </div> <div> <br> </div> <div> CHAPTER 23 </div> <div> <br> </div> <div> &nbsp; &nbsp; SD-Access. . . . . . . . . . . . . . . . . . . . . . . . 467 </div> <div> <br> </div> <div> &nbsp; &nbsp; SD-Access Overview.. . . . . . . . . . . . . . . . . . 468 </div> <div> <br> </div> <div> &nbsp; &nbsp; SD-Access Architecture.. . . . . . . . . . . . . . . . . 471 </div> <div> <br> </div> <div> &nbsp; &nbsp; SD-Access Operational Planes.. . . . . . . . . . . . . . . 474 </div> <div> <br> </div> <div> &nbsp; &nbsp; SD-Access Fabric Roles and Components.. . . . . . . . . . . 477 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 484 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 484 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 485 </div> <div> <br> </div> <div> CHAPTER 24 </div> <div> <br> </div> <div> &nbsp; &nbsp; QoS. . . . . . . . . . . . . . . . . . . . . . . . . . 487 </div> <div> <br> </div> <div> &nbsp; &nbsp; The Need for QoS.. . . . . . . . . . . . . . . . . . . 488 </div> <div> <br> </div> <div> &nbsp; &nbsp; QoS Models and Components.. . . . . . . . . . . . . . . 493 </div> <div> <br> </div> <div> &nbsp; &nbsp; Congestion Management and Congestion Avoidance.. . . . . . . 499 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 503 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 503 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 504 </div> <div> <br> </div> <div> CHAPTER 25 </div> <div> <br> </div> <div> &nbsp; &nbsp; Switching.. . . . . . . . . . . . . . . . . . . . . . . . 505 </div> <div> <br> </div> <div> &nbsp; &nbsp; Traffic Forwarding Basics. . . . . . . . . . . . . . . . . 506 </div> <div> <br> </div> <div> &nbsp; &nbsp; Forwarding Architectures. . . . . . . . . . . . . . . . . 511 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 522 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 523 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 523 </div> <div> <br> </div> <div> Part V: Virtualization </div> <div> <br> </div> <div> CHAPTER 26 </div> <div> <br> </div> <div> &nbsp; &nbsp; Basic Virtualization.. . . . . . . . . . . . . . . . . . . . 525 </div> <div> <br> </div> <div> &nbsp; &nbsp; Virtualization Overview.. . . . . . . . . . . . . . . . . 526 </div> <div> <br> </div> <div> &nbsp; &nbsp; Virtual Machines (VMs). . . . . . . . . . . . . . . . . 532 </div> <div> <br> </div> <div> &nbsp; &nbsp; Virtual Switching.. . . . . . . . . . . . . . . . . . . 535 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 542 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 543 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 543 </div> <div> <br> </div> <div> CHAPTER 27 </div> <div> <br> </div> <div> &nbsp; &nbsp; VRF Instances, GRE, and IPsec. . . . . . . . . . . . . . . . 545 </div> <div> <br> </div> <div> &nbsp; &nbsp; Virtual Routing and Forwarding (VRF).. . . . . . . . . . . . 546 </div> <div> <br> </div> <div> &nbsp; &nbsp; Generic Routing Encapsulation (GRE).. . . . . . . . . . . . 552 </div> <div> <br> </div> <div> &nbsp; &nbsp; IPsec VPNs.. . . . . . . . . . . . . . . . . . . . . 558 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 570 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 571 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 571 </div> <div> <br> </div> <div> CHAPTER 28 </div> <div> <br> </div> <div> &nbsp; &nbsp; Extending the Network Virtually.. . . . . . . . . . . . . . . . 573 </div> <div> <br> </div> <div> &nbsp; &nbsp; Locator ID/Separation Protocol (LISP).. . . . . . . . . . . . 574 </div> <div> <br> </div> <div> &nbsp; &nbsp; Virtual Extensible LAN (VXLAN).. . . . . . . . . . . . . 580 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 585 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 586 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 586 </div> <div> <br> </div> <div> Part VI: Network Assurance </div> <div> <br> </div> <div> CHAPTER 29 </div> <div> <br> </div> <div> &nbsp; &nbsp; Troubleshooting.. . . . . . . . . . . . . . . . . . . . . . 587 </div> <div> <br> </div> <div> &nbsp; &nbsp; Troubleshooting Overview.. . . . . . . . . . . . . . . . 588 </div> <div> <br> </div> <div> &nbsp; &nbsp; Simple Network Management Protocol (SNMP).. . . . . . . . 604 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 610 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 611 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 611 </div> <div> <br> </div> <div> CHAPTER 30 </div> <div> <br> </div> <div> &nbsp; &nbsp; Monitoring. . . . . . . . . . . . . . . . . . . . . . . . 613 </div> <div> <br> </div> <div> &nbsp; &nbsp; Syslog.. . . . . . . . . . . . . . . . . . . . . . . 614 </div> <div> <br> </div> <div> &nbsp; &nbsp; NetFlow and Flexible NetFlow. . . . . . . . . . . . . . . 620 </div> <div> <br> </div> <div> &nbsp; &nbsp; Switch Port Analyzer (SPAN), Remote SPAN (RSPAN), and Encapsulated Remote SPAN (ERSPAN)... 632 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 639 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 640 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 640 </div> <div> <br> </div> <div> CHAPTER 31 </div> <div> <br> </div> <div> &nbsp; &nbsp; IP SLA and DNA Center.. . . . . . . . . . . . . . . . . . . 641 </div> <div> <br> </div> <div> &nbsp; &nbsp; IP SLA Overview.. . . . . . . . . . . . . . . . . . . 642 </div> <div> <br> </div> <div> &nbsp; &nbsp; Cisco DNA Center Assurance. . . . . . . . . . . . . . . 652 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 660 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 660 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 660 </div> <div> <br> </div> <div> CHAPTER 32 </div> <div> <br> </div> <div> &nbsp; &nbsp; NETCONF and RESTCONF.. . . . . . . . . . . . . . . . . . 661 </div> <div> <br> </div> <div> &nbsp; &nbsp; NETCONF. . . . . . . . . . . . . . . . . . . . . 662 </div> <div> <br> </div> <div> &nbsp; &nbsp; RESTCONF.. . . . . . . . . . . . . . . . . . . . . 668 </div> <div> <br> </div> <div> &nbsp; &nbsp; Review Questions.. . . . . . . . . . . . . . . . . . . 671 </div> <div> <br> </div> <div> &nbsp; &nbsp; Further Reading.. . . . . . . . . . . . . . . . . . . . 671 </div> <div> <br> </div> <div> &nbsp; &nbsp; What's Next?.. . . . . . . . . . . . . . . . . . . . . 671 </div> <div> <br> </div> <div> Glossary.. . . . . . . . . . . . . . . . . . . . . . . . 673 </div> <div> <br> </div> <div> <br> </div> <div> <br> </div> <div> 9780136891932, TOC, 2/15/2022 </div> <div> <br> </div> <div> <br> </div>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram