Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying CCNA Routing and Switching 200-125 Certification Guide
  • Table Of Contents Toc
  • Feedback & Rating feedback
CCNA Routing and Switching 200-125 Certification Guide

CCNA Routing and Switching 200-125 Certification Guide

By : Lazaro (Laz) Diaz
3.4 (5)
close
close
CCNA Routing and Switching 200-125 Certification Guide

CCNA Routing and Switching 200-125 Certification Guide

3.4 (5)
By: Lazaro (Laz) Diaz

Overview of this book

Cisco Certified Network Associate (CCNA) Routing and Switching is one of the most important qualifications for keeping your networking skills up to date. CCNA Routing and Switching 200-125 Certification Guide covers topics included in the latest CCNA exam, along with review and practice questions. This guide introduces you to the structure of IPv4 and IPv6 addresses and examines in detail the creation of IP networks and sub-networks and how to assign addresses in the network. You will then move on to understanding how to configure, verify, and troubleshoot layer 2 and layer 3 protocols. In addition to this, you will discover the functionality, configuration, and troubleshooting of DHCPv4. Combined with router and router simulation practice, this certification guide will help you cover everything you need to know in order to pass the CCNA Routing and Switching 200-125 exam. By the end of this book, you will explore security best practices, as well as get familiar with the protocols that a network administrator can use to monitor the network.
Table of Contents (24 chapters)
close
close
4
Subnetting in IPv4
21
Mock Test Questions
22
Assessments

Access-Control List

Security is the most vital part of any network. We must make sure that our information is secure from the outside as well as from the inside. Not only do we have to worry about unauthorized personnel coming in through our WAN connections, we also must be concerned about the employees who are already present inside our network. There could be a potential threat to the company inside as well.

In this chapter, we will cover how to create an Access-Control List that will mitigate threats externally and internally. We will cover standard ACLs, Extended ACLs, Named ACLs, and Remarks. We will briefly cover some aspects of firewalls and their policies.

While going through this chapter, keep in mind that security is done in layers. You need to ask yourself, How vital is the information I am trying to secure, and, How determinedly are people trying to get in?

The following...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
CCNA Routing and Switching 200-125 Certification Guide
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon