Book Image

CCNA Routing and Switching 200-125 Certification Guide

By : Lazaro (Laz) Diaz
Book Image

CCNA Routing and Switching 200-125 Certification Guide

By: Lazaro (Laz) Diaz

Overview of this book

Cisco Certified Network Associate (CCNA) Routing and Switching is one of the most important qualifications for keeping your networking skills up to date. CCNA Routing and Switching 200-125 Certification Guide covers topics included in the latest CCNA exam, along with review and practice questions. This guide introduces you to the structure of IPv4 and IPv6 addresses and examines in detail the creation of IP networks and sub-networks and how to assign addresses in the network. You will then move on to understanding how to configure, verify, and troubleshoot layer 2 and layer 3 protocols. In addition to this, you will discover the functionality, configuration, and troubleshooting of DHCPv4. Combined with router and router simulation practice, this certification guide will help you cover everything you need to know in order to pass the CCNA Routing and Switching 200-125 exam. By the end of this book, you will explore security best practices, as well as get familiar with the protocols that a network administrator can use to monitor the network.
Table of Contents (24 chapters)
4
Subnetting in IPv4
21
Mock Test Questions
22
Assessments

Access-Control List

Security is the most vital part of any network. We must make sure that our information is secure from the outside as well as from the inside. Not only do we have to worry about unauthorized personnel coming in through our WAN connections, we also must be concerned about the employees who are already present inside our network. There could be a potential threat to the company inside as well.

In this chapter, we will cover how to create an Access-Control List that will mitigate threats externally and internally. We will cover standard ACLs, Extended ACLs, Named ACLs, and Remarks. We will briefly cover some aspects of firewalls and their policies.

While going through this chapter, keep in mind that security is done in layers. You need to ask yourself, How vital is the information I am trying to secure, and, How determinedly are people trying to get in?

The following...