Learn Cisco Network Administration in a Month of Lunches
Ben Piper
  • MEAP began December 2015
  • Publication in April 2017 (estimated)
  • ISBN 9781617293634
  • 382 pages (estimated)
  • printed in black & white

Most businesses and consumers depend on reliable computer networks for banking, learning, entertainment, and staying in touch. Cisco is the leader in networking, particularly in large organizations. Cisco skills are highly valued and there are a lot of opportunities for career advancement for those who have these skills.

Learn Cisco Network Administration in a Month of Lunches is a tutorial designed for beginners who want to learn how to administer Cisco switches and routers. Just set aside one hour a day (lunchtime would be perfect) for a month, and you'll start learning practical Cisco Network administration skills faster than you ever thought possible. You'll start with the basics - a clear, concise overview of how Cisco Networks function. Then, you'll move systematically through the techniques and features you'll use to perform the most common administration tasks.

Table of Contents detailed table of contents

1. Before You Begin

1.1. Is this book for you?

1.2. How to use this book

1.3. Lab considerations

1.3.1. Choosing your lab environment

1.3.2. Virtual lab considerations

1.3.3. Practicing on a live, production network

1.3.4. My recommendation for your lab environment

1.3.5. Cisco Internetwork Operating System (IOS) versions

1.4. Online resources

1.5. A word on my recommendations

1.6. Being an immediately effective network administrator

2. What is a Cisco Network?

2.1. The truth about routers and switches

2.2. MAC addresses

2.3. The Ethernet frame: a big envelope

2.3.1. When everybody talks, nobody listens

2.4. Broadcast domains

2.4.1. Closing the floodgates: the MAC address table

2.4.2. Breaking up the broadcast domain

2.4.3. Joining broadcast domains

2.4.4. Addressing devices across broadcast domains

2.5. Internet protocol (IP) addresses

2.5.1. Where are you?

2.5.2. The IP vs. MAC dilemma

2.5.3. Address resolution protocol (ARP)

2.6. Connecting broadcast domains using a router

2.6.1. Where are you? Where am I?

2.6.2. Understanding subnets

2.7. Traversing broadcast domains using a default gateway

2.8. Managing routers and switches

2.9. Hands—on Lab

3. A Crash Course on Cisco's Internetwork Operating System (IOS)

3.1. What is IOS?

3.2. Logging into Cisco devices

3.3. The show command

3.3.1. Filtering output

3.4. Identifying the IOS version and package

3.4.1. Version numbers

3.4.2. Packages

3.5. Viewing the running configuration

3.6. Changing the running configuration

3.7. Saving the startup configuration

3.8. The 'no' command

3.9. Commands in this chapter

3.10. Hands—on Lab

4. Managing Switch Ports

4.1. Viewing port status

4.2. Enabling ports

4.2.1. The interface range command

4.3. Disabling ports

4.3.1. Finding unused interfaces

4.4. Changing the port speed and duplex

4.4.1. Speed

4.4.2. Duplex

4.4.3. Autonegotiation

4.4.4. Changing the port speed

4.4.5. Changing the duplex

4.5. Commands in this chapter

4.6. Hands—on Lab

5. Securing Ports by Using the Port Security Feature

5.1. The Minimum Port Security Configuration

5.1.1. Preventing MAC Flood Attacks

5.1.2. Violation Modes

5.2. Testing Port Security

5.3. Handling device moves

5.3.1. Port Security never forgets!

5.3.2. Aging Time

5.4. Preventing Unauthorized Devices

5.4.1. Making Port Security maximally secure

5.4.2. Sticky MAC Addresses

5.4.3. Caveats about sticky MACs

5.5. Commands in this chapter

5.6. Hands—on Lab

6. Managing Virtual LANs (VLANs)

6.1. What is a VLAN?

6.2. Inventorying VLANs

6.2.1. The VLAN Database

6.2.2. The Default VLAN

6.2.3. How many VLANs should you create?

6.2.4. Planning a new VLAN

6.3. Creating VLANs

6.4. Assigning VLANs

6.4.1. Checking Port Configuration

6.4.2. Setting the Access VLAN

6.4.3. Setting the Access Mode

6.5. Voice VLANs

6.6. Using your new VLANs

6.7. Commands in this chapter

6.8. Hands—on Lab

7. Breaking the VLAN Barrier by using Switched Virtual Interfaces

7.1. Understanding the VLAN-subnet connection

7.2. Switches or routers?

7.2.1. Enabling IP Routing

7.3. What are switched virtual interfaces (SVIs)?

7.3.1. Creating and Configuring SVIs

7.4. Default gateways

7.4.1. Testing Inter-VLAN connectivity

7.5. Commands in this chapter

7.6. Hands—on Lab

8. IP Address Assignment by Using Dynamic Host Configuration Protocol (DHCP)

8.1. To switch or not to switch?

8.2. Configuring a Cisco DHCP Server

8.2.1. Scopes

8.2.2. Options

8.2.3. Lease time

8.2.4. Subnets and VLANs

8.3. Configuring a DHCP Pool

8.4. Excluding Addresses from Assignment

8.5. Configuring Devices to Request DHCP Addresses

8.6. Associating DHCP Pools with VLANs

8.7. Creating a second DHCP Pool

8.8. Viewing DHCP Leases

8.9. Using Non-Cisco DHCP Servers

8.9.1. Asking the switch for help using the ip helper-address command

8.10. Commands in this chapter

8.11. Hands—on Lab

9. Securing the Network by using IP Access Lists

9.1. Blocking IP-to-IP traffic

9.1.1. Creating an Access List

9.2. Applying an ACL to an interface

9.3. IP Access Lists and DHCP

9.4. Blocking IP-to-subnet traffic

9.4.1. Wildcard masks

9.4.2. Replacing an ACL

9.4.3. Applying an Access Control List to a Switched Virtual Interface

9.5. Blocking subnet-to-subnet traffic

9.6. Commands in this chapter

9.7. Hands—on Lab

10. Connecting Switches Together Using Trunk Links

10.1. Connecting the new switch

10.2.2. Configuring DTP to automatically negotiate a trunk

10.3. Configuring Switch2

10.3.1. Configuring VLANs on the new switch

10.4. Moving devices to the new switch

10.5. Changing the Trunk Encapsulation

10.6. Commands in this chapter

10.7. Hands—on Lab

11. Automatically Configuring VLANs Using the VLAN Trunking Protocol (VTP)

11.1. Two words of warning

11.2. Configuring Switch1 as a VTP server

11.3. Configuring Switch2 as a VTP client

11.4. Creating New VLANs on Switch1

11.5. Enabling VTP Pruning

11.6. Commands in this chapter

11.7. Hands—on Lab

12. Protecting Against Bridging Loops by Using the Spanning Tree Protocol (STP)

12.1. How Spanning Tree Works

12.2. Rapid Spanning Tree (RSTP)

12.3. PortFast

12.4. Commands in this chapter

12.5. Hands—on Lab

13. Optimizing Network Performance by Using Port Channels

13.1. Static or dynamic?

13.3. Creating a static Port Channel

13.4. Load Balancing Methods

13.5. Commands in this chapter

13.6. Hands—on Lab

14. Making the Network Scalable by Connecting Routers and Switches Together

14.1. The router—on—a—stick—configuration

14.2. Connecting Router1

14.3. Configuring Subinterfaces

14.4. The IP routing table

14.5. Applying an ACL to a Subinterface

14.6. Commands in this chapter

14.7. Hands—on Lab

15. Manually Directing Traffic Using the IP Routing Table

15.1. Connecting Router1 to Switch2

15.2. Configuring Transit Subnets

15.2.1. Assigning transit IP addresses directly to physical interfaces

15.2.2. Assigning transit IP addresses to subinterfaces and SVIs

15.4. Configuring default gateways

15.5. Creating a DHCP pool for the Executives subnet

15.6. Commands in this chapter

15.7. Hands—on Lab

16. A Dynamic Routing Protocols Crash Course

16.1. Understanding Router IDs

16.1.1. Configuring loopback interfaces

16.2. Configuring EIGRP

16.2.1. Choosing the best path

16.2.2. Routing around failures

16.2.3. EIGRP Recap

16.3. Open Shortest Path First

16.4. Commands in this chapter

16.5. Hands—on Lab

17. Tracking down devices

17.1. Device-tracking scenarios

17.2. Steps to tracking down a device

17.2.1. Get the IP address

17.2.2. Trace the device to the last hop

17.2.3. Get the MAC address

17.3. Example 1 - Tracking down a network printer

17.3.1. Tracing to the last hop using traceroute

17.3.2. Cisco Discovery Protocol

17.3.3. Obtaining the MAC address of the device

17.3.4. Viewing the MAC address table

17.4. Example 2 - Tracking down a server

17.4.1. Tracing to the last hop using traceroute

17.4.2. Obtaining the MAC address of the device

17.4.3. Viewing the MAC address table

17.5. Commands used in this chapter

17.6. Hands-on lab

18. Securing Cisco devices

18.1. Creating a privileged user account

18.1.1. Testing the account

18.2. Reconfiguring the VTY lines

18.2.1. Enabling SSH and disabling Telnet access

18.2.2. Restricting SSH access using access lists

18.3. Securing the console port

18.4. Commands used in this chapter

18.5. Hands-on lab

19. Facilitating troubleshooting using logging and debugging

19.1. Configuring the logging buffer

19.2. Debug commands

19.2.1. Debugging Port Security

19.2.2. Debugging DHCP

19.2.3. Debugging the VLAN Trunking Protocol

19.2.4. Debugging IP routing

19.3. Logging severity levels

19.4. Configuring syslogging

19.5. Commands used in this chapter

19.6. Hands-on lab

20. Recovering from disaster

20.1. Narrow the scope to a subset of devices

20.2. Reloading the device

20.2.1. Scheduling a reload

20.3. Deleting the startup configuration

20.4. Resetting the password

20.4.1. Resetting the password on a router

20.4.2. Resetting the password on a switch

20.5. Commands used in this chapter

21. Performance and health checklist

21.1. Is the CPU being overloaded?

21.2. What's the system uptime?

21.3. Is there a damaged network cable or jack?

21.4. Are ping times unusually high or inconsistent?

21.5. Are routes flapping?

21.6. Commands in this chapter

21.7. Hands-on lab

22. Next steps

22.1. Certification resources

22.2. Cisco's Virtual Internet Routing Lab

22.3. Troubleshooting end-user connectivity

22.4. Never the end

What's inside

  • Enabling, disabling, and securing switch ports
  • Creating VLANs
  • Configuring DHCP
  • IP access lists
  • Connecting and configuring routers
  • Configuring static and dynamic routing
  • A solid foundation for pursuing Cisco certifications

About the reader

Readers have some experience with Windows system administration. No programming or prior Cisco experience is assumed.

About the author

Ben Piper is an IT consultant specializing in advanced enterprise networking and virtualization technologies. He holds numerous Cisco, Citrix, and Microsoft certifications including the Cisco CCNA and CCNP. His "Practical Networking" course on Pluralsight has been in the top 100 and has received high praise from network novices and veterans alike.

Manning Early Access Program (MEAP) Read chapters as they are written, get the finished eBook as soon as it’s ready, and receive the pBook long before it's in bookstores.
Buy
MEAP combo $39.99 pBook + eBook
MEAP eBook $31.99 pdf + ePub + kindle

FREE domestic shipping on three or more pBooks