search for books and compare prices
Tables of Contents for Ccie Professional Devlopment
Chapter/Section Title
Page #
Page Count
Introduction
xxiv
 
Objectives
xxv
1
Audience
xxvi
1
Organization
xxvii
1
Conventions and Features
xxviii
 
Foreword
1
2
Part I Routing Basics
3
186
Chapter 1 Basic Concepts: Internetworks, Routers, and Addresses
4
24
Bicycles with Motors
6
1
Data Link Addresses
7
4
Repeaters and Bridges
11
7
Routers
18
4
Network Addresses
22
3
Looking Ahead
25
1
Recommended Reading
25
1
Review Questions
26
2
Chapter 2 TCP/IP Review
28
62
The TCP/IP Protocol Layers
29
3
The IP Packet Header
32
8
IP Addresses
40
23
The First Octet Rule
45
3
Address Masks
48
3
Subnets and Subnet Masks
51
4
Designing Subnets
55
2
Breaking the Octet Boundary
57
5
Troubleshooting a Subnet Mask
62
1
ARP
63
10
Proxy ARP
69
3
Gratuitous ARP
72
1
Reverse ARP
72
1
ICMP
73
5
The Host-to-Host Layer
78
6
TCP
78
5
UDP
83
1
Looking Ahead
84
1
Summary Table: Chapter 2 Command Review
85
1
Recommended Reading
85
1
Review Questions
86
1
Configuration Exercises
87
1
Troubleshooting Exercises
88
2
Chapter 3 Static Routing
90
46
The Route Table
92
5
Configuring Static Routes
97
17
Case Study: Simple Static Routes
97
4
Case Study: Summary Routes
101
2
Case Study: Alternative Routes
103
2
Case Study: Floating Static Routes
105
4
Case Study: Load Sharing
109
1
Per Destination Load Sharing and Fast Switching
110
1
Per Packet Load Sharing and Process Switching
111
2
Case Study: Recursive Table Lookups
113
1
Troubleshooting Static Routes
114
12
Case Study: Tracing a Failed Route
115
6
Case Study: A Protocol Conflict
121
5
Looking Ahead
126
1
Summary Table: Chapter 3 Command Review
126
1
Review Questions
127
1
Configuration Exercises
128
2
Troubleshooting Exercises
130
6
Chapter 4 Dynamic Routing Protocols
136
53
Routing Protocol Basics
138
8
Path Determination
138
3
Metrics
141
1
Hop Count
142
1
Bandwidth
142
1
Load
143
1
Delay
143
1
Reliability
143
1
Cost
144
1
Convergence
144
2
Load Balancing
146
1
Distance Vector Routing Protocols
146
14
Common Characteristics
148
1
Periodic Updates
148
1
Neighbors
148
1
Broadcast Updates
148
1
Full Routing Table Updates
149
1
Routing by Rumor
149
2
Route Invalidation Timers
151
1
Split Horizon
152
4
Counting to Infinity
156
1
Triggered Updates
157
1
Holddown Timers
158
1
Asynchronous Updates
158
2
Link State Routing Protocols
160
23
Neighbors
161
1
Link State Flooding
162
1
Sequence Numbers
163
9
Aging
172
1
The Link State Database
173
3
The SPF Algorithm
176
5
Areas
181
2
Interior and Exterior Gateway Protocols
183
2
Static or Dynamic Routing?
185
1
Looking Ahead
186
1
Recommended Reading
186
2
Review Questions
188
1
Part II Interior Routing Protocols
189
504
Chapter 5 Routing Information Protocol (RIP)
190
40
Operation of RIP
192
13
RIP Timers and Stability Features
193
3
RIP Message Format
196
3
Request Message Types
199
1
Classful Routing
200
1
Classful Routing: Directly Connected Subnets
201
2
Classful Routing: Summarization at Boundary Routers
203
2
Classful Routing: Summary
205
1
Configuring RIP
205
14
Case Study: A Basic RIP Configuration
205
2
Case Study: Passive Interfaces
207
3
Case Study: Configuring Unicast Updates
210
2
Case Study: Discontiguous Subnets
212
4
Case Study: Manipulating RIP Metrics
216
3
Troubleshooting RIP
219
1
Looking Ahead
220
1
Summary Table: Chapter 5 Command Review
220
1
Recommended Reading
220
1
Review Questions
221
1
Configuration Exercises
221
2
Troubleshooting Exercises
223
7
Chapter 6 Interior Gateway Routing Protocol (IGRP)
230
50
Operation of IGRP
232
17
IGRP Timers and Stability Features
235
2
IGRP Metrics
237
8
IGRP Packet Format
245
4
Configuring IGRP
249
11
Case Study: A Basic IGRP Configuration
250
1
Case Study: Unequal-Cost Load Balancing
251
5
Case Study: Setting Maximum Paths
256
1
Case Study: Multiple IGRP Processes
257
3
Troubleshooting IGRP
260
6
Case Study: Unequal-Cost Load Balancing, Again
261
2
Case Study: A Segmented Network
263
3
Looking Ahead
266
1
Summary Table: Chapter 6 Command Review
267
1
Recommended Reading
268
1
Review Questions
268
1
Configuration Exercises
269
4
Troubleshooting Exercises
273
7
Chapter 7 Routing Information Protocol Version 2
280
46
Operation of RIPv2
282
14
RIPv2 Message Format
282
4
Compatibility with RIPv1
286
1
Classless Route Lookups
287
1
Classless Routing Protocols
287
1
Variable-Length Subnet Masking
288
4
Authentication
292
4
Configuring RIPv2
296
13
Case Study: A Basic RIPv2 Configuration
297
1
Case Study: Compatibility with RIPv1
297
3
Case Study: Using VLSM
300
3
Case Study: Discontiguous Subnets and Classless Routing
303
3
Case Study: Authentication
306
3
Troubleshooting RIPv2
309
8
Case Study: Misconfigured VLSM
310
7
Looking Ahead
317
1
Summary Table: Chapter 7 Command Review
317
1
Recommended Reading
318
1
Review Questions
318
1
Configuration Exercises
319
2
Troubleshooting Exercises
321
5
Chapter 8 Enhanced Interior Gateway Routing Protocol (EIGRP)
326
82
Operation of EIGRP
329
47
Protocol-Dependent Modules
330
1
Reliable Transport Protocol
331
2
Neighbor Discovery/Recovery
333
2
The Diffusing Update Algorithm
335
1
DUAL: Preliminary Concepts
335
1
The DUAL Finite State Machine
345
4
Diffusing Computation: Example 1
349
5
Diffusing Computation: Example 2
354
9
EIGRP Packet Formats
363
1
The EIGRP Packet Header
363
2
General TLV Fields
365
1
IP-Specific TLV Fields
366
5
Address Aggregation
371
5
Configuring EIGRP
376
11
Case Study: A Basic EIGRP Configuration
377
2
Case Study: Redistribution with IGRP
379
4
Case Study: Disabling Automatic Summarization
383
1
Case Study: Address Aggregation
384
1
Authentication
385
2
Troubleshooting EIGRP
387
12
Case Study: A Missing Neighbor
388
6
Stuck-in-Active Neighbors
394
5
Looking Ahead
399
1
Summary Table: Chapter 8 Command review
399
2
Review Questions
401
1
Configuration Exercises
402
2
Troubleshooting Exercises
404
4
Chapter 9 Open Shortest Path First
408
184
Operation of OSPF
410
106
Neighbors and Adjacencies
412
1
The Hello Protocol
413
2
Network Types
415
3
Designated Routers and Backup Designated Routers
418
5
OSPF Interfaces
423
7
OSPF Neighbors
430
20
Flooding
450
7
Areas
457
3
Router Types
460
2
Partitioned Areas
462
1
Virtual Links
463
3
The Link State Database
466
4
LSA Types
470
9
Stub Areas
479
6
The Route Table
485
1
Destination Types
486
1
Path Types
487
3
Route Table Lookups
490
1
Authentication
491
1
OSPF over Demand Circuits
491
2
OSPF Packet Formats
493
2
The Packet Header
495
3
The Hello Packet
498
1
The Database Description Packet
499
2
The Link State Request Packet
501
1
The Link State Update Packet
502
1
The Link State Acknowledgment Packet
503
1
OSPF LSA Formats
504
1
The LSA Header
504
2
The Router LSA
506
3
The Network LSA
509
1
The Network and ASBR Summary LSAs
510
2
The Autonomous System External LSA
512
1
The NSSA External LSA
513
2
The Options Field
515
1
Configuring OSPF
516
61
Case Study: A Basic OSPF Configuration
516
4
Case Study: Setting Router IDs with Loopback Interfaces
520
5
Case Study: Domain Name Service Lookups
525
1
Case Study: OSPF and Secondary Addresses
526
5
Case Study: Stub Areas
531
5
Case Study: Totally Stubby Areas
536
1
Case Study: Not-So-Stubby Areas
537
8
Case Study: Address Summarization
545
5
Case Study: Authentication
550
3
Case Study: Virtual Links
553
2
Case Study: OSPF on NBMA Networks
555
10
Case Study: OSPF over Demand Circuits
565
2
Troubleshooting OSPF
567
14
Case Study: An Isolated Area
572
5
Case Study: Misconfigured Summarization
577
4
Looking Ahead
581
1
Summary Table: Chapter 9 Command Review
581
2
Recommended Reading
583
1
Review Questions
584
1
Configuration Exercises
585
3
Troubleshooting Exercises
588
4
Chapter 10 Integrated IS-IS
592
101
Operation of Integrated IS-IS
595
52
IS-IS Areas
597
3
Network Entity Titles
600
3
IS-IS Functional Organization
603
1
Subnetwork Dependent Functions
604
6
Subnetwork Independent Functions
610
11
IS-IS PDU Formats
621
3
CLV Fields
624
3
The IS-IS Hello PDU Format
627
9
The IS-IS Link State PDU Format
636
10
The IS-IS Sequence Numbers PDU Format
646
1
Configuring Integrated IS-IS
647
24
Case Study: A Basic Integrated IS-IS Configuration
650
5
Case Study: Changing the Router Types
655
5
Case Study: An Area Migration
660
4
Case Study: Route Summarization
664
4
Case Study: Authentication
668
3
Troubleshooting Integrated IS-IS
671
13
Troubleshooting IS-IS Adjacencies
672
1
Troubleshooting the IS-IS Link State Database
673
5
Case Study: Integrated IS-IS on NBMA Networks
678
6
Looking Ahead
684
1
Summary Table: Chapter 10 Command Review
685
1
Review Questions
686
2
Configuration Exercises
688
2
Troubleshooting Exercises
690
3
Part III Route Control and Interoperability
693
150
Chapter 11 Route Redistribution
694
48
Principles of Redistribution
698
14
Metrics
698
1
Administrative Distances
699
8
Redistributing from Classless to Classful Protocols
707
5
Configuring Redistribution
712
25
Case Study: Redistributing IGRP and RIP
715
2
Case Study: Redistributing EIGRP and OSPF
717
5
Case Study: Redistribution and Route Summarization
722
8
Case Study: Redistributing IS-IS and RIP
730
3
Case Study: Redistributing Static Routes
733
4
Looking Ahead
737
1
Summary Table: Chapter 11 Command Review
738
1
Review Questions
738
1
Configuration Exercises
739
1
Troubleshooting Exercises
740
2
Chapter 12 Default Routes and On-Demand Routing
742
26
Fundamentals of Default Routes
744
2
Fundamentals of On-Demand Routing
746
4
Configuring Default Routes and ODR
750
14
Case Study: Static Default Routes
751
4
Case Study: The Default-Network Command
755
3
Case Study: The Default-Information Originate Command
758
5
Case Study: Configuring On-Demand Routing
763
1
Looking Ahead
764
1
Summary Table: Chapter 12 Command Review
765
1
Review Questions
765
3
Chapter 13 Route Filtering
768
36
Configuring Route Filters
771
26
Case Study: Filtering Specific Routes
772
4
Case Study: Route Filtering and Redistribution
776
4
Case Study: A Protocol Migration
780
7
Case Study: Multiple Redistribution Points
787
7
Case Study: Using Distances to Set Router Preferences
794
3
Looking Ahead
797
1
Summary Table: Chapter 13 Command Review
797
1
Configuration Exercises
798
3
Troubleshooting Exercises
801
3
Chapter 14 Route Maps
804
39
Basic Uses of Route Maps
805
4
Configuring Route Maps
809
27
Case Study: Policy Routing
812
8
Case Study: Policy Routing and Quality of Service Routing
820
4
Case Study: Route Maps and Redistribution
824
5
Case Study: Route Tagging
829
7
Looking A head
836
1
Summary Table: Chapter 14 Command Review
837
2
Review Questions
839
1
Configuration Exercises
839
2
Troubleshooting Exercises
841
2
Part IV Appendixes
843
1
Appendix A Tutorial: Working with Binary and Hex
844
8
Working with Binary Numbers
847
2
Working with Hexadecimal Numbers
849
3
Appendix B Tutorial: Access Lists
852
30
Access List Basics
854
8
Implicit Deny Any
856
1
Sequentiality
856
1
Access List Types
857
4
Editing Access Lists
861
1
Standard IP Access Lists
862
3
Extended IP Access Lists
865
7
TCP Access Lists
869
1
UDP Access Lists
870
1
ICMP Access Lists
871
1
Calling the Access List
872
3
Keyword Alternatives
875
1
Named Access Lists
876
1
Filter Placement Considerations
877
3
Access List Monitoring and Accounting
880
2
Appendix C CCIE Preparation Tips
882
10
Laying the Foundations
885
1
Hands-On Experience
886
1
Intensifying the Study
887
1
The Final Six Months
888
1
Exam Day
889
3
Appendix D Answers to Review Questions
892
28
Chapter 1
893
3
Chapter 2
896
4
Chapter 3
900
2
Chapter 4
902
3
Chapter 5
905
1
Chapter 6
906
1
Chapter 7
907
1
Chapter 8
908
3
Chapter 9
911
3
Chapter 10
914
2
Chapter 11
916
1
Chapter 12
917
1
Chapter 14
918
2
Appendix E Solutions to Configuration Problems
920
46
Chapter 2
921
1
Chapter 3
931
4
Chapter 5
935
3
Chapter 6
938
1
Chapter 7
939
3
Chapter 8
942
1
Chapter 9
943
5
Chapter 10
948
10
Chapter 11
958
1
Chapter 13
959
3
Chapter 14
962
4
Appendix F Solutions to Troubleshooting Exercises
966
8
Chapter 2
967
1
Chapter 3
968
1
Chapter 5
968
2
Chapter 6
970
1
Chapter 7
970
1
Chapter 8
970
1
Chapter 9
971
1
Chapter 10
971
1
Chapter 11
972
1
Chapter 13
972
1
Chapter 14
973
1
Index
974