Читать книгу CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies - Ben Piper, David Higby Clinton - Страница 9
List of Illustrations
Оглавление1 Chapter 1Figure 1.1 How layers abstract the network from an applicationFigure 1.2 At each layer, data is encapsulated in a PDU and passed down to the n...Figure 1.3 Layer 2 frame and layer 1 packet, structurally identical to the revis...Figure 1.4 Early Ethernet over a shared medium compared to Ethernet using a swit...Figure 1.5 Simple layer 2 and layer 3 topologiesFigure 1.6 Layered representation of the networkFigure 1.7 Encapsulation of a TCP segment and IP packet inside an Ethernet frame...
2 Chapter 2Figure 2.1 Physical looped topologyFigure 2.2 Converged STP topology with SW1 as the rootFigure 2.3 Multiple VLANs over 802.1Q trunksFigure 2.4 Converged STP topology with SW3 as the new rootFigure 2.5 VLAN 1 topology with SW3 as rootFigure 2.6 Converged VLAN 1 topology with SW2 Gi1/0...Figure 2.7 Multiple Spanning TreeFigure 2.8 Physical topology for Exercise 2.1
3 Chapter 3Figure 3.1 East-West traffic flow in a data center network using the leaf...Figure 3.2 Core, distribution, and access tiersFigure 3.3 Two access-distribution blocks connected to the coreFigure 3.4 Collapsed coreFigure 3.5 Switched vs. routed topologyFigure 3.6 A looped triangle topologyFigure 3.7 A looped square topologyFigure 3.8 Recommended loop-free topologyFigure 3.9 Loop-free U-topologyFigure 3.10 Loop-free inverted-U topologyFigure 3.11 Virtual switch topologyFigure 3.12 Routed access topologyFigure 3.13 EtherChannel between SW3 and SW4
4 Chapter 4Figure 4.1 Representation of radio wave at 10 Hz with an amplitude of 1...Figure 4.2 Amplitude decreases with the square of the distance.
5 Chapter 5Figure 5.1 An OSPF topologyFigure 5.2 Layer 2 topology
6 Chapter 6Figure 6.1 Simple EIGRP topologyFigure 6.2 EIGRP weighted metric formulaFigure 6.3 EIGRP layer 3 topologyFigure 6.4 Layer 2 topology
7 Chapter 7Figure 7.1 BGP peers in different autonomous systemsFigure 7.2 Route propagation and loop prevention among BGP neighbors in...Figure 7.3 Layer 3 topology using BGP, OSPF, and EIGRP
8 Chapter 8Figure 8.1 Inside versus outside networksFigure 8.2 Static NATFigure 8.3 Layer 3 topologyFigure 8.4 Layer 2 topologyFigure 8.5 Multicast topology
9 Chapter 9Figure 9.1 Setting a QoS profileFigure 9.2 The Platinum QoS profile
10 Chapter 10Figure 10.1 L2 VM-to-VM traffic using a virtual switching...Figure 10.2 L2 VM-to-switch traffic using a virtual switc...Figure 10.3 L3 VM-to-VM traffic using a virtual switch an...Figure 10.4 L2 VM-to-VM traffic switched internally using...Figure 10.5 L2 VM-to-VM traffic switched externally using...Figure 10.6 Underlay topology running BGP. R1 (AS 65001) and R2 (AS 650...Figure 10.7 GRE topologyFigure 10.8 Using LISP for IP mobilityFigure 10.9 VXLAN flood-and-learn configuration using mul...Figure 10.10 VRF topology
11 Chapter 11Figure 11.1 Scalable groups in Cisco DNA CenterFigure 11.2 Group-based access control policies in Cisco DNA CenterFigure 11.3 Network Settings page under the Design workflow of Cisco DNA CenterFigure 11.4 Inventory page under the Provision workflow of Cisco DNA CenterFigure 11.5 Fabric Infrastructure page under the Provision workflow of Cisco DNA...Figure 11.6 Fabric Host Onboarding page under the Provision workflow of Cisco DN...Figure 11.7 The Overall Health dashboard in the Assurance workflow of Cisco DNA ...Figure 11.8 The Application Health dashboard in the Assurance workflow of Cisco ...Figure 11.9 The Client Health dashboard in the Assurance workflow of Cisco DNA C...Figure 11.10 The vManage Network Management System web interface
12 Chapter 12Figure 12.1 Example network topologyFigure 12.2 WebAuth login page configurationFigure 12.3 WLAN listFigure 12.4 WLAN layer 2 configurationFigure 12.5 RADIUS server configurationFigure 12.6 AAA server configurationFigure 12.7 WLAN WPA2 and 802.1X configurationFigure 12.8 Specifying security and encryption authentication methodFigure 12.9 Specifying user authentication modeFigure 12.10 Setting a WPA/WPA2 preshared key