Table of Contents Cover Title Page Copyright Publisher's Note Acknowledgments About the Author Introduction Assessment Test Answers to Assessment Test Chapter 1: Internetworking Internetworking Basics Internetworking Models The OSI Reference Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 1.1 Answers to Written Lab 1.2 Answers to Written Lab 1.3 Chapter 2: Review of Ethernet Networking and Data Encapsulation Ethernet Networks in Review Ethernet Cabling Data Encapsulation The Cisco Three-Layer Hierarchical Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 2.1 Answers to Written Lab 2.2 Answers to Written Lab 2.3 Answers to Written Lab 2.4 Chapter 3: Introduction to TCP/IP Introducing TCP/IP TCP/IP and the DoD Model IP Addressing IPv4 Address Types Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 3.1 Answers to Written Lab 3.2 Chapter 4: Easy Subnetting Subnetting Basics Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 4.1 Answers to Written Lab 4.2 Answers to Written Lab 4.3 Chapter 5: Variable Length Subnet Masks (VLSMs), Summarization, and Troubleshooting TCP/IP Variable Length Subnet Masks (VLSMs) Summarization Troubleshooting IP Addressing Summary Exam Essentials Written Lab Review Questions Answers to Review Questions Answers to Written Lab Chapter 6: Cisco’s Internetworking Operating System (IOS) The IOS User Interface Command-Line Interface (CLI) Router and Switch Administrative Configurations Router Interfaces Viewing, Saving, and Erasing Configurations Summary Exam Essentials Written Lab Hands-on Labs Review Questions Answers to Review Questions Answers to Written Lab Chapter 7: Managing a Cisco Internetwork The Internal Components of a Cisco Router The Router Boot Sequence Managing Configuration Register Backing Up and Restoring the Cisco IOS Backing Up and Restoring the Cisco Configuration Using Cisco Discovery Protocol (CDP) Using Telnet Resolving Hostnames Checking Network Connectivity and Troubleshooting Summary Exam Essentials Written Lab Hands-on Labs Review Questions Answers to Review Questions Answers to Written Lab Chapter 8: IP Routing Routing Basics The IP Routing Process Configuring IP Routing in Our Network Dynamic Routing Distance-Vector Routing Protocols Routing Information Protocol (RIP) Verifying Your Configurations Summary Exam Essentials Written Lab Hands-on Labs Review Questions Answers to Review Questions Answers to Written Lab Chapter 9: Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF) EIGRP Features and Operation Using EIGRP to Support Large Networks Configuring EIGRP Load Balancing with EIGRP Verifying EIGRP Open Shortest Path First (OSPF) Basics Configuring OSPF Verifying OSPF Configuration OSPF DR and BDR Elections OSPF and Loopback Interfaces Troubleshooting OSPF Configuring EIGRP and OSPF Summary Routes Summary Exam Essentials Written Lab Hands-on Labs Review Questions Answers to Review Questions Answers to Written Lab Chapter 10: Layer Switching and Spanning Tree Protocol (STP) Before Layer Switching Switching Services Spanning Tree Protocol (STP) Configuring Catalyst Switches Summary Exam Essentials Written Lab 10 Review Questions Answers to Review Questions Answers to Written Lab 10 Chapter 11: Virtual LANs (VLANs) VLAN Basics VLAN Memberships Identifying VLANs VLAN Trunking Protocol (VTP) Routing between VLANs Configuring VLANs Configuring VTP Telephony: Configuring Voice VLANs Summary Exam Essentials Written Lab 11 Review Questions Answers to Review Questions Answers to Written Lab 11 Chapter 12: Security Perimeter, Firewall, and Internal Routers Introduction to Access Lists Standard Access Lists Extended Access Lists Turning Off and Configuring Network Services Monitoring Access Lists Summary Exam Essentials Written Lab 12 Hands-on Labs Review Questions Answers to Review Questions Answers to Written Lab 12 Chapter 13: Network Address Translation (NAT) When Do We Use NAT? Types of Network Address Translation NAT Names How NAT Works Testing and Troubleshooting NAT Summary Exam Essentials Written Lab 13 Hands-on Labs Review Questions Answers to Review Questions Answers to Written Lab 13 Chapter 14: Cisco’s Wireless Technologies Introduction to Wireless Technology Basic Wireless Devices Wireless Regulations Wireless Topologies Wireless Security Summary Exam Essentials Written Lab 14 Review Questions Answers to Review Questions Answers to Written Lab 14 Chapter 15: Internet Protocol Version (IPv6) Why Do We Need IPv6? The Benefits and Uses of IPv6 IPv6 Addressing and Expressions How IPv6 Works in an Internetwork IPv6 Routing Protocols Migrating to IPv6 Summary Exam Essentials Written Lab 15 Review Questions Answers to Review Questions Answers to Written Lab 15 Chapter 16: Wide Area Networks Introduction to Wide Area Networks Cable and DSL Cabling the Serial Wide Area Network High-Level Data-Link Control (HDLC) Protocol Point-to-Point Protocol (PPP) Frame Relay Virtual Private Networks Summary Exam Essentials Written Lab 16 Hands-on Labs Review Questions Answers to Review Questions Answers to Written Lab 16 Appendix: About the Companion CD What You’ll Find on the CD System Requirements Using the CD Troubleshooting Index End-User License Agreement CD Information Perf Card – Objectives Map CCNA: Cisco Certified Network Associate Study Guide, Seventh Edition Acquisitions Editor: Jeff Kellum Development Editor: Kathi Duggan Technical Editors: Dan Garfield and John Rouda Production Editor: Christine O’Connor Copy Editor: Judy Flynn Editorial Manager: Pete Gaughan Production Manager: Tim Tate Vice President and Executive Group Publisher: Richard Swadley Vice President and Publisher: Neil Edde Media Project Manager 1: Laura Moss-Hollister Media Associate Producer: Shawn Patrick Media Quality Assurance: Josh Frank Book Designers: Judy Fung and Bill Gibson Compositor: Craig Woods, Happenstance Type-O-Rama Proofreader: Jen Larsen, Word One Indexer: Robert Swanson Project Coordinator, Cover: Katherine Crocker Cover Designer: Ryan Sneed Copyright © 2011 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-90107-76 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600 Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose No warranty may be created or extended by sales or promotional materials The advice and strategies contained herein may not be suitable for every situation This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services If professional assistance is required, the services of a competent professional person should be sought Neither the publisher nor the author shall be liable for damages arising herefrom The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S at (877) 762-2974, outside the U.S at (317) 572-3993 or fax (317) 572-4002 Wiley also publishes its books in a variety of electronic formats Some content that appears in print may not be available in electronic books Library of Congress Cataloging-in-Publication DataLammle, Todd CCNA : Cisco Certified Network Associate study guide / Todd Lammle — 7th ed p cm ISBN 978-0-470-90107-6 (pbk.) 978-1-118-08804-3 (ebk.) 978-1-118-08805-0 (ebk.) 978-1-118-08806-7 (ebk.) Electronic data processing personnel—Certification Computer networks—Examinations—Study guides I Title II Title: Cisco certified network associate study guide QA76.3.L348 2011 004.6—dc22 2011004111 TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc and/or its affiliates, in the United States and other countries, and may not be used without written permission CISA and Certified Information Systems Auditor are registered trademarks of ISACA All other trademarks are the property of their respective owners Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book 10 TFTP See trivial file transfer protocol three-layer hierarchical model access layer core layer distribution layer functions three-way handshakes time to live (TTL) timeouts traceroute commands timers CDP holddown RIP route flush route invalid route update TKIP See temporal key integrity protocol TLS See transport layer security toll networks, WAN traceroute commands configurations ICMP error messages network connectivity TTL tracert command traffic congestion bandwidth broadcast storms multicast transmission control protocol/Internet protocol (TCP/IP) See also Internet protocol addresses history host-to-host layer destination ports key concepts port numbers segment format source ports syn packet acknowledgment UDP Internets intranet IP addresses APIPA bits broadcast addresses bytes data encapsulation hierarchical schemes MAC v network addresses NIC octets private reversed purpose Telnet connection assessment DoD model IOS multiple devices passwords prompts remote routers session closing user assessment VLSMs transparent bridging transport layer, OSI reference model acknowledgments connection-oriented communication buffers call setup establishment three-way handshakes transfers flow control buffering congestion avoidance segment transmission windowing reliable networking transport layer security (TLS) trivial file transfer protocol (TFTP) IOS backups trunk ports, VLANs configurations allow definitions changes and modifications Cisco Catalyst 3560 switch options TTL timeouts See time to live timeouts tunneling U UDP See user datagram protocol unicast addresses IPv6 unique local addresses unlicensed wireless frequencies unreachable messages, disabling UplinkFast feature configuration user datagram protocol (UDP) disabling TCP NFS segment format user EXEC mode ping commands user interfaces, IOS CLI routers access auxiliary port connections console port costs Ethernet filenames non-ISR out-of-band POST RAM decompression setup mode SSH Telnet V variable length subnet masks (VLSMs) classful routing classless routing design design classless routing examples solutions supernetting EIGRP network support subnet masks network implementation block sizes hosts links tables TCP/IP videoconferencing virtual LANs (VLANs) See also trunk ports, VLANs basic features benefits flat network broadcast control switches broadcast domains configurations default inter-VLAN communication routers subinterfaces switch port assignment trunk ports voice VLANs VTP definition flexibility hubs identification access ports frame tagging IEEE 802.1Q ISL trunk ports memberships dynamic static network management NIC routers configurations individual inter-VLAN communication scalability security switches Cisco Catalyst 579 physical boundary removal voice CDP configurations IP phone traffic VTP basic goals configurations operation modes transparent mode troubleshooting virtual private networks (VPNs) extranet GRE IPSec AH encryption ESP security transforms remote access site-to-site tunneling protocols VLAN trunking protocol (VTP) basic goals configurations databases operation modes clients pruning servers transparent mode troubleshooting VLANs See virtual LANs VLSMs See variable length subnet masks voice over IP (VoIP) WLAN voice VLANs CDP configurations IP phone traffic VoIP See voice over IP VPNs See virtual private networks VTP See VLAN trunking protocol VTY access See secure shell; Telnet W WAN See wide area networks WEP See wired equivalency privacy wide area networks (WAN) See also point-to-point protocol basic features cable network terms support central office connection bandwidth connection types circuit switching leased lines packet switching CPE CSU/DSU DCE definition demarcation point DSL ADSL connections support types DTE Ethernet networks LRE PPPoE frame relay CIR congestion control development DLCIs encapsulation types interfaces LMI monitoring technology troubleshooting virtual circuits HDLC support local loop PPP authentication methods components configurations debugging IP addresses, mismatched LCP configurations mismatched encapsulations session establishment stacks support verifications serial transmission support ATM cable DSL DWDM frame relays HDLC ISDN LAPB LAPD MPLS PPP PPPoE toll networks VPN Wi-Fi protected access (WPA) EAP wildcard masking blocking windowing wired equivalency privacy (WEP) wireless local area network (WLAN) APs devices diversity with contemporary versions devices antennas APs WNIC 802.11 standards block acknowledgment committees and subcommittees CSMA/CD DSSS 5GHz 40Mhz channels MIMO OFDM security speed comparisons 2.4GHz overview regulations agencies 802.11 transmission FCC standards unlicensed frequencies security address authentication 802.11i encryption methods open-access mode SSID SSIDs WEP WPA technology topologies ad hoc networks BSS distribution system ESS IBSS infrastructure basic service set SSID VoIP wireless network interface card (WNIC) WLAN See wireless local area network WNIC See wireless network interface card workgroup layer, See also distribution layer, three-layer hierarchical model WPA See Wi-Fi protected access X X Window X.25 PAD service, disabling of Y Yeager, William Wiley Publishing, Inc.End-User License Agreement READ THIS You should carefully read these terms and conditions before opening the software packet(s) included with this book “Book” This is a license agreement “Agreement” between you and Wiley Publishing, Inc “WPI” By opening the accompanying software packet(s), you acknowledge that you have read and accept the following terms and conditions If you not agree and not want to be bound by such terms and conditions, promptly return the Book and the unopened software packet(s) to the place you obtained them for a full refund License Grant WPI grants to you (either an individual or entity) a nonexclusive license to use one copy of the enclosed software program(s) (collectively, the “Software,” solely for your own personal or business purposes on a single computer (whether a standard computer or a workstation component of a multi-user network) The Software is in use on a computer when it is loaded into temporary memory (RAM) or installed into permanent memory (hard disk, CD-ROM, or other storage device) WPI reserves all rights not expressly granted herein Ownership WPI is the owner of all right, title, and interest, including copyright, in and to the compilation of the Software recorded on the physical packet included with this Book “Software Media” Copyright to the individual programs recorded on the Software Media is owned by the author or other authorized copyright owner of each program Ownership of the Software and all proprietary rights relating thereto remain with WPI and its licensers Restrictions On Use and Transfer (a) You may only (i) make one copy of the Software for backup or archival purposes, or (ii) transfer the Software to a single hard disk, provided that you keep the original for backup or archival purposes You may not (i) rent or lease the Software, (ii) copy or reproduce the Software through a LAN or other network system or through any computer subscriber system or bulletin-board system, or (iii) modify, adapt, or create derivative works based on the Software (b) You may not reverse engineer, decompile, or disassemble the Software You may transfer the Software and user documentation on a permanent basis, provided that the transferee agrees to accept the terms and conditions of this Agreement and you retain no copies If the Software is an update or has been updated, any transfer must include the most recent update and all prior versions Restrictions on Use of Individual Programs You must follow the individual requirements and restrictions detailed for each individual program in the About the CD-ROM appendix of this Book or on the Software Media These limitations are also contained in the individual license agreements recorded on the Software Media These limitations may include a requirement that after using the program for a specified period of time, the user must pay a registration fee or discontinue use By opening the Software packet(s), you will be agreeing to abide by the licenses and restrictions for these individual programs that are detailed in the About the CD-ROM appendix and/or on the Software Media None of the material on this Software Media or listed in this Book may ever be redistributed, in original or modified form, for commercial purposes Limited Warranty (a) WPI warrants that the Software and Software Media are free from defects in materials and workmanship under normal use for a period of sixty (60) days from the date of purchase of this Book If WPI receives notification within the warranty period of defects in materials or workmanship, WPI will replace the defective Software Media (b) WPI AND THE AUTHOR(S) OF THE BOOK DISCLAIM ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WITH RESPECT TO THE SOFTWARE, THE PROGRAMS, THE SOURCE CODE CONTAINED THEREIN, AND/OR THE TECHNIQUES DESCRIBED IN THIS BOOK WPI DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET YOUR REQUIREMENTS OR THAT THE OPERATION OF THE SOFTWARE WILL BE ERROR FREE (c) This limited warranty gives you specific legal rights, and you may have other rights that vary from jurisdiction to jurisdiction Remedies (a) WPI’s entire liability and your exclusive remedy for defects in materials and workmanship shall be limited to replacement of the Software Media, which may be returned to WPI with a copy of your receipt at the following address: Software Media Fulfillment Department, Attn.: CCNA:Cisco Certified Network Associate Study Guide, Seventh Edition , Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, or call 1-800-762-2974 Please allow four to six weeks for delivery This Limited Warranty is void if failure of the Software Media has resulted from accident, abuse, or misapplication Any replacement Software Media will be warranted for the remainder of the original warranty period or thirty (30) days, whichever is longer (b) In no event shall WPI or the author be liable for any damages whatsoever (including without limitation damages for loss of business profits, business interruption, loss of business information, or any other pecuniary loss) arising from the use of or inability to use the Book or the Software, even if WPI has been advised of the possibility of such damages (c) Because some jurisdictions not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation or exclusion may not apply to you U.S Government Restricted Rights Use, duplication, or disclosure of the Software for or on behalf of the United States of America, its agencies and/or instrumentalities “U.S Government” is subject to restrictions as stated in paragraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause of DFARS 252.227-7013, or subparagraphs (c) (1) and (2) of the Commercial Computer Software - Restricted Rights clause at FAR 52.227-19, and in similar clauses in the NASA FAR supplement, as applicable General This Agreement constitutes the entire understanding of the parties and revokes and supersedes all prior agreements, oral or written, between them and may not be modified or amended except in a writing signed by both parties hereto that specifically refers to this Agreement This Agreement shall take precedence over any other documents that may be in conflict herewith If any one or more provisions contained in this Agreement are held by any court or tribunal to be invalid, illegal, or otherwise unenforceable, each and every other provision shall remain in full force and effect The Absolutely Best CCNA Book/CD Package on the Market! Get ready for your Cisco Certified Network Associate exam with the most comprehensive and challenging sample tests anywhere! The Sybex Test Engine features: All the review questions, as covered in each chapter of the book Challenging questions representative of those you’ll find on the real exam Two practice exams available only on the CD Use Glossary for instant reference Preview copy of Todd Lammle’s CCNA Audio and Video series Over 30 minutes of instructional video from networking guru Todd Lammle Over a half hour of CCNA audio review in MP3 format Use the Electronic Flashcards to jog your memory and prep last-minute for the exam! Reinforce your understanding of key concepts with these hardcore flashcard-style questions Now you can study for the CCNA exam any time, anywhere CCNA: Cisco Certified Network Associate Study Guide, Seventh Edition CCNA (640-802) Exam Objectives Objective Describe how a network works Describe the purpose and functions of various network devices Select the components required to meet a network specification Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network Describe common networked applications including web applications Describe the purpose and basic operation of the protocols in the OSI and TCP models Describe the impact of applications (Voice over IP and Video over IP) on a network Interpret network diagrams Determine the path between two hosts across a network Describe the components required for network and Internet communications Identify and correct common network problems at layers 1, 2, 3, and using a layered model approach Differentiate between LAN/WAN operation and features Configure, verify, and troubleshoot a switch with VLANs and interswitch communications Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts Explain the technology and media access control method for Ethernet networks Explain network segmentation and basic traffic management concepts Explain basic switching concepts and the operation of Cisco switches Perform and verify initial switch configuration tasks including remote access management Verify network status and switch operation using basic utilities (including Ping, Traceroute, Telnet, SSH, ARP, ipconfig), SHOW and DEBUG commands Identify, prescribe, and resolve common switched network media issues, configuration issues, auto-negotiation, and switch hardware failures Describe enhanced switching technologies (including VTP, RSTP, VLAN, PVSTP, 802.1q) Describe how VLANs create logically separate networks and the need for routing between them Configure, verify, and troubleshoot VLANs Configure, verify, and troubleshoot trunking on Cisco switches Configure, verify, and troubleshoot interVLAN routing Configure, verify, and troubleshoot VTP Configure, verify, and troubleshoot RSTP operation Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network Implement basic switch security (including port security, trunk access, management vlan other than vlan1, etc.) Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network Describe the operation and benefits of using private and public IP addressing Explain the operation and benefits of using DHCP and DNS Configure, verify and troubleshoot DHCP and DNS operation on a router (including CLI/SDM) Implement static and dynamic addressing services for hosts in a LAN environment Calculate and apply an addressing scheme, including VLSM IP addressing design to a network Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment Describe the technological requirements for running IPv6 in conjunction with IPv4 (including protocols, dual stack, tunneling, etc.) Describe IPv6 addresses Identify and correct common problems associated with IP addressing and host configurations Configure, verify, and troubleshoot basic router operation and routing on Cisco devices Describe basic routing concepts (including: packet forwarding, router lookup process) Describe the operation of Cisco routers (including: router bootup process, POST, router components) Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts Configure, verify, and troubleshoot RIPv2 Access and utilize the router to set basic parameters (including CLI/SDM) Connect, configure, and verify operation status of a device interface Verify device configuration and network connectivity using Ping, Traceroute, Telnet, SSH, or other utilities Perform and verify routing configuration tasks for a static or default route given specific routing requirements Manage IOS configuration files (including save, edit, upgrade, restore) Manage Cisco IOS Compare and contrast methods of routing and routing protocols Configure, verify, and troubleshoot OSPF Configure, verify, and troubleshoot EIGRP Verify network connectivity (including using Ping, Traceroute, and Telnet or SSH) Troubleshoot routing issues Chapter 1 1, 1, 3, 11 1, 1, 1, 16 2, 10 2, 10 1, 2, 10 10 10 10, 11 10, 11 11 11 11 11 11 11 11 7, 11 10,11 3, 4, 5 15 15 8 6, 8, 6, 8, 6, 8, 8, 7 8, 9 6, 7, 8, 6, 8, Verify router hardware and software operation using SHOW and DEBUG commands Implement basic router security Explain and select the appropriate administrative tasks required for a WLAN Describe standards associated with wireless media (including IEEE Wi-Fi Alliance, ITU/FCC) Identify and describe the purpose of the components in a small wireless network (including SSID, BSS, ESS) Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point Compare and contrast wireless security features and capabilities of WPA security (including open, WEP, WPA-1/2) Identify common issues with implementing wireless networks (including: interface misconfiguration) Identify security threats to a network and describe general methods to mitigate those threats Describe today’s increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats Explain general methods to mitigate common security threats to network devices, hosts, and applications Describe the functions of common security appliances and applications Describe security recommended practices including initial steps to secure network devices Implement, verify, and troubleshoot NAT and ACLs in a medium-size enterprise branch office network Describe the purpose and types of ACLs Configure and apply ACLs based on network filtering requirements (including CLI/SDM) Configure and apply an ACLs to limit Telnet and SSH access to the router using (including SDM/CLI) Verify and monitor ACLs in a network environment Troubleshoot ACL issues Explain the basic operation of NAT Configure NAT for given network requirements (including CLI/SDM) Troubleshoot NAT issues Implement and verify WAN links Describe different methods for connecting to a WAN Configure and verify a basic WAN serial connection Configure and verify Frame Relay on Cisco routers Troubleshoot WAN implementation issues Describe VPN technology (including importance, benefits, role, impact, components) Configure and verify a PPP connection between Cisco routers 6, 8, 6, 12 14 14 14 14 14 12 12 12 12 12 12 12 12 12 13 13 13 16 16 16 16 16 16 Exam objectives are subject to change at any time without prior notice and at Cisco's sole discretion Please visit Cisco's website (www.cisco.com) for the most current listing of exam objectives ... can become a Cisco Certified Network Associate for the meager cost of this book and either one test (640- 802) at $250 or two tests (640- 816 and 640- 822) at $125 each—although the CCNA exams are... security, and access lists How Do You Become a CCNA? The way to become a CCNA is to pass one little test (CCNA Composite exam 640- 802) Then—poof!—you’re a CCNA (Don’t you wish it were that easy?) True,... CCENT (Cisco Certified Entry Networking Technician) This is one step toward your CCNA To achieve your CCNA, you must still pass your ICND2 exam Again, this book was written for the CCNA 640- 802