ebook img

CCENT Cisco Certified Entry Networking Technician Study Guide (Exam 640-822) (Study Guide Book & CD) PDF

561 Pages·2008·17.33 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview CCENT Cisco Certified Entry Networking Technician Study Guide (Exam 640-822) (Study Guide Book & CD)

® ™ CCENT Cisco Certifie d Entry Networking Technician Study Guide (Exam 640-822) This page intentionally left blank ® ™ CCENT Cisco Certifie d Entry Networking Technician Study Guide (Exam 640-822) Matthew Walker Angie Walker This study/training guide and/or material is not sponsored by, endorsed by, or affiliated with Cisco Systems, Inc. in any manner. Cisco®, Cisco Systems®, CCDA®, CCNA®, CCDP®, CCNP®, CCIE®, CCIP®, CCSP®, CCVP®, CCDETM, CCENTTM, the Cisco Systems logo, and the Cisco Certified Internetwork Expert logo are trademarks or registered trademarks of Cisco Systems, Inc., in the United States and certain other countries. All other trademarks are trademarks of their respective owners. This publication and CD may be used in assisting students to prepare for an exam. Neither The McGraw-Hill Companies nor Boson Software warrant that use of this publication and CD will ensure passing any exam. New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2008 by The McGraw-Hill Companies. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. 0-07-164378-8 The material in this eBook also appears in the print version of this title: 0-07-159114-1. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at This book is dedicated to my father, Ronald Walker (1947–2008). We miss you, Dad. This page intentionally left blank ABOUT THE AUTHORS Matthew Walker is the IA Training Instructor Supervisor and a Sr. IA Analyst at Dynetics, Inc., in Huntsville, Alabama. An IT education professional for over 15 years, Matt served as the Director of the Network Training Center and the Curriculum Lead and Senior Instructor for the local Cisco Networking Academy on Ramstein AB, Germany. After leaving the US Air Force, Matt served as a Network Engineer for NASA’s Secure Network Systems, designing and maintaining secured data, voice, and video networking for the agency. He has written and contributed to numerous technical training books for Air Education and Training Command, United States Air Force, and continues to train, and write, certification and college-level IT and IA Security courses. Matt holds numerous commercial certifications, including Cisco Certified Network Professional (CCNP), Microsoft Certified System Engineer (MCSE), CEH (Certified Ethical Hacker), CNDA (Certified Network Defense Architect), and Certified Pen Test Specialist (CPTS). Angie Walker is currently the Chief Information Security Officer for the University of North Alabama, located in beautiful Florence, Alabama. Among the many positions she has filled over the course of her 20-plus years in Information Technology and Information Assurance are Manager of the Information Systems Security (ISS) Office for the Missile Defense Agency (MDA) South, as well as the lead for the MDA Alternate Computer Emergency Response Team (ACERT). She served as Superintendent of the United States Air Forces in Europe (USAFE) Communications and Information Training Center, Superintendent of the 386 Communications Squadron on Ali Al Saleem AB, Kuwait, and Senior Information Security Analyst for Army Aviation Unmanned Aircraft Systems. Angie holds several industry certifications, including CISSP, Network+ and Security+, and a master’s degree in Information Systems Management. With over nine years of IT and IA educational experience, she has developed and taught courseware worldwide for the US Air Force, as well as several computer science courses as an instructor for the University of Alabama in Huntsville, and Kaplan University in Fort Lauderdale, Florida. Copyright © 2008 by The McGraw-Hill Companies. Click here for terms of use. About the Tech Editor Bobby E. Rogers is a Senior Information Assurance Analyst for Dynetics, Inc., in Huntsville, Alabama. In addition to working in the Certification and Accreditation process for the U.S. government, Bobby also leads penetration testing teams for Dynetics. Bobby recently retired from the United States Air Force after almost 21 years, serving as a computer networking and security specialist, and has designed and managed networks all over the world. He has held several positions of responsibility overseeing network security in both the Department of Defense and private company networks. His duties have included perimeter security, client-side security, security policy development, security training, penetration testing, and computer crime investigation. As a trainer, he has taught a wide variety of IT-related subjects in both makeshift classrooms in tents in the desert and formal training centers. He also has taught a wide variety of courses as a part-time contractor for several nationally known training centers and a major university. Bobby is an accomplished author, having written numerous IT articles in various publications and training materials for the U.S. Air Force, and has authored several training videos on a wide variety of IT security topics. He is also a regular security article contributor for several online IT sites. He has a Bachelor of Science degree in Computer Information Systems from Excelsior College, and two Associates in Applied Science degrees from the Community College of the Air Force. Bobby’s professional IT certifications include: A+, Security+, ACP, CCNA, CCAI, CIW, CIWSA, MCP+I, MCSA (Windows 2000 & 2003), MCSE (Windows NT4, 2000, & 2003), MCSE: Security (Windows 2000 & 2003), CISSP, CHFI, CIFI, CPTS, and CEH. Copyright © 2008 by The McGraw-Hill Companies. Click here for terms of use. CONTENTS AT A GLANCE 1 Networking 101 ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 TCP/IP .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 3 Network Media and Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 4 Ethernet Fundamentals ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 5 Switching: Moving Data Inside Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 6 Routing Essentials and IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 7 IP Address Subnetting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 8 Interfacing with Cisco Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 9 Cisco Switch Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 10 Cisco Router Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 11 WANs and WLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 12 Applications, Security, and Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 A About the CD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455 Glossary .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 Index .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495 ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.