HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
PDF The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Scaling Networks Companion Guide is the official supplemental textbook for the Scaling Networks course in the Cisco® CCNA® Academy®
This course describes the architecture, components, and operations of routers and switches in a large and complex network. You will learn how to configure routers and switches for advanced functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with OSPF, EIGRP, STP, and VTP in both IPv4 and IPv6 networks. You will also develop the knowledge and skills needed to implement DHCP and DNS operations in a network.
The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.
The book’s features help you focus on important concepts to succeed in this course:
Related Title: Scaling Networks Lab Manual
ISBN-13: 978-1-58713-325-1
ISBN-10: 1-58713-325-3
Introduction xx
Chapter 1 Introduction to Scaling Networks 1
Objectives 1
Key Terms 1
Introduction (1.0.1.1) 3
Implementing a Network Design (1.1) 3
Hierarchical Network Design (1.1.1) 3
The Need to Scale the Network (1.1.1.1) 3
Enterprise Business Devices (1.1.1.2) 5
Hierarchical Network Design (1.1.1.3) 6
Cisco Enterprise Architecture (1.1.1.4) 7
Failure Domains (1.1.1.5) 9
Expanding the Network (1.1.2) 11
Design for Scalability (1.1.2.1) 11
Planning for Redundancy (1.1.2.2) 12
Increasing Bandwidth (1.1.2.3) 13
Expanding the Access Layer (1.1.2.4) 14
Fine-tuning Routing Protocols (1.1.2.5) 15
Selecting Network Devices (1.2) 18
Switch Hardware (1.2.1) 18
Switch Platforms (1.2.1.1) 18
Port Density (1.2.1.2) 21
Forwarding Rates (1.2.1.3) 22
Power over Ethernet (1.2.1.4) 23
Multilayer Switching (1.2.1.5) 25
Router Hardware (1.2.2) 26
Router Requirements (1.2.2.1) 26
Cisco Routers (1.2.2.2) 28
Router Hardware (1.2.2.3) 29
Managing Devices (1.2.3) 30
Managing IOS Files and Licensing (1.2.3.1) 30
In-Band Versus Out-of-Band Management (1.2.3.2) 30
Basic Router CLI Commands (1.2.3.3) 31
Basic Router show Commands (1.2.3.4) 34
Basic Switch CLI Commands (1.2.3.5) 39
Basic Switch show Commands (1.2.3.6) 40
Summary (1.3) 44
Practice 45
Class Activities 45
Labs 45
Packet Tracer Activities 45
Check Your Understanding Questions 46
Chapter 2 LAN Redundancy 49
Objectives 49
Key Terms 49
Introduction (2.0.1.1) 51
Spanning Tree Concepts (2.1) 52
Purpose of Spanning Tree (2.1.1) 52
Redundancy at OSI Layers 1 and 2 (2.1.1.1) 52
Issues with Layer 1 Redundancy: MAC Database Instability (2.1.1.2) 54
Issues with Layer 1 Redundancy: Broadcast Storms (2.1.1.3) 56
Issues with Layer 1 Redundancy: Duplicate Unicast Frames (2.1.1.4) 57
STP Operation (2.1.2) 59
Spanning Tree Algorithm: Introduction (2.1.2.1) 59
Spanning Tree Algorithm: Port Roles (2.1.2.2) 61
Spanning Tree Algorithm: Root Bridge (2.1.2.3) 63
Spanning Tree Algorithm: Path Cost (2.1.2.4) 64
802.1D BPDU Frame Format (2.1.2.5) 67
BPDU Propagation and Process (2.1.2.6) 68
Extended System ID (2.1.2.7) 74
Varieties of Spanning Tree Protocols (2.2) 77
Overview (2.2.1) 77
List of Spanning Tree Protocols (2.2.1.1) 78
Characteristics of the Spanning Tree Protocols (2.2.1.2) 79
PVST+ (2.2.2) 80
Overview of PVST+ (2.2.2.1) 80
Port States and PVST+ Operation (2.2.2.2) 82
Extended System ID and PVST+ Operation (2.2.2.3) 83
Rapid PVST+ (2.2.3) 84
Overview of Rapid PVST+ (2.2.3.1) 84
RSTP BPDU (2.2.3.2) 86
Edge Ports (2.2.3.3) 87
Link Types (2.2.3.4) 88
Spanning Tree Configuration (2.3) 90
PVST+ Configuration (2.3.1) 90
Catalyst 2960 Default Configuration (2.3.1.1) 90
Configuring and Verifying the Bridge ID (2.3.1.2) 91
PortFast and BPDU Guard (2.3.1.3) 93
PVST+ Load Balancing (2.3.1.4) 95
Rapid PVST+ Configuration (2.3.2) 98
Spanning Tree Mode (2.3.2.1) 98
STP Configuration Issues (2.3.3) 101
Analyzing the STP Topology (2.3.3.1) 101
Expected Topology Versus Actual Topology (2.3.3.2) 102
Overview of Spanning Tree Status (2.3.3.3) 102
Spanning Tree Failure Consequences (2.3.3.4) 103
Repairing a Spanning Tree Problem (2.3.3.5) 105
First Hop Redundancy Protocols (2.4) 105
Concept of First Hop Redundancy Protocols (2.4.1) 106
Default Gateway Limitations (2.4.1.1) 106
Router Redundancy (2.4.1.2) 107
Steps for Router Failover (2.4.1.3) 108
Varieties of First Hop Redundancy Protocols (2.4.2) 109
First Hop Redundancy Protocols (2.4.2.1) 109
FHRP Verification (2.4.3) 110
HSRP Verification (2.4.3.1) 110
GLBP Verification (2.4.3.2) 112
Syntax Checker – HSRP and GLBP (2.4.3.3) 114
Summary (2.5) 115
Practice 116
Class Activities 116
Labs 116
Packet Tracer Activities 116
Check Your Understanding Questions 117
Chapter 3 LAN Aggregation 121
Objectives 121
Key Terms 121
Introduction (3.0.1.1) 122
Link Aggregation Concepts (3.1) 122
Link Aggregation (3.1.1) 123
Introduction to Link Aggregation (3.1.1.1) 123
Advantages of EtherChannel (3.1.1.2) 124
EtherChannel Operation (3.1.2) 125
Implementation Restrictions (3.1.2.1) 125
Port Aggregation Protocol (3.1.2.2) 126
Link Aggregation Control Protocol (3.1.2.3) 128
Link Aggregation Configuration (3.2) 130
Configuring EtherChannel (3.2.1) 130
Configuration Guidelines (3.2.1.1) 130
Configuring Interfaces (3.2.1.2) 131
Verifying and Troubleshooting EtherChannel (3.2.2) 133
Verifying EtherChannel (3.2.2.1) 133
Troubleshooting EtherChannel (3.2.2.2) 135
Summary (3.3) 139
Practice 140
Class Activities 140
Labs 140
Packet Tracer Activities 140
Check Your Understanding Questions 141
Chapter 4 Wireless LANs 145
Objectives 145
Key Terms 145
Introduction (4.0.1.1) 147
Wireless Concepts (4.1) 147
Introduction to Wireless (4.1.1) 147
Supporting Mobility (4.1.1.1) 148
Benefits of Wireless (4.1.1.2) 148
Wireless Technologies (4.1.1.3) 149
Radio Frequencies (4.1.1.4) 150
802.11 Standards (4.1.1.5) 151
Wi-Fi Certification (4.1.1.6) 153
Comparing WLANs to a LAN (4.1.1.7) 154
Components of WLANs (4.1.2) 156
Wireless NICs (4.1.2.1) 156
Wireless Home Router (4.1.2.2) 157
Business Wireless Solutions (4.1.2.3) 159
Wireless Access Points (4.1.2.4) 160
Small Wireless Deployment Solutions (4.1.2.5) 162
Large Wireless Deployment Solutions (4.1.2.6, 4.1.2.7) 165
Wireless Antennas (4.1.2.8) 168
802.11 WLAN Topologies (4.1.3) 170
802.11 Wireless Topology Modes (4.1.3.1) 170
Ad Hoc Mode (4.1.3.2) 170
Infrastructure Mode (4.1.3.3) 171
Wireless LAN Operations (4.2) 173
802.11 Frame Structure (4.2.1) 173
Wireless 802.11 Frame (4.2.1.1) 173
Frame Control Field (4.2.1.2) 175
Wireless Frame Type (4.2.1.3) 177
Management Frames (4.2.1.4) 177
Control Frames (4.2.1.5) 180
Wireless Operation (4.2.2) 181
Carrier Sense Multiple Access with Collision Avoidance (4.2.2.1) 181
Wireless Clients and Access Point Association (4.2.2.2) 183
Association Parameters (4.2.2.3) 183
Discovering APs (4.2.2.4) 187
Authentication (4.2.2.5) 189
Channel Management (4.2.3) 191
Frequency Channel Saturation (4.2.3.1) 191
Selecting Channels (4.2.3.2) 193
Planning a WLAN Deployment (4.2.3.3) 196
Wireless LAN Security (4.3) 198
WLAN Threats (4.3.1) 198
Securing Wireless (4.3.1.1) 198
DoS Attack (4.3.1.2) 199
Management Frame DoS Attacks (4.3.1.3) 200
Rogue Access Points (4.3.1.4) 202
Man-in-the-Middle Attack (4.3.1.5) 203
Securing WLANs (4.3.2) 205
Wireless Security Overview (4.3.2.1) 205
Shared Key Authentication Methods (4.3.2.2) 206
Encryption Methods (4.3.2.3) 208
Authenticating a Home User (4.3.2.4) 208
Authentication in the Enterprise (4.3.2.5) 210
Wireless LAN Configuration (4.4) 211
Configure a Wireless Router (4.4.1) 211
Configuring a Wireless Router (4.4.1.1) 211
Setting Up and Installing Initial Linksys EA6500 (4.4.1.2) 213
Configuring the Linksys Smart Wi-Fi Home Page (4.4.1.3) 217
Smart Wi-Fi Settings (4.4.1.4) 218
Smart Wi-Fi Tools (4.4.1.5) 220
Backing Up a Configuration (4.4.1.6) 224
Configuring Wireless Clients (4.4.2) 225
Connecting Wireless Clients (4.4.2.1) 225
Troubleshoot WLAN Issues (4.4.3) 226
Troubleshooting Approaches (4.4.3.1) 226
Wireless Client Not Connecting (4.4.3.2) 227
Troubleshooting When the Network Is Slow (4.4.3.3) 229
Updating Firmware (4.4.3.4) 230
Summary (4.5) 232
Practice 233
Class Activities 233
Labs 233
Packet Tracer Activities 234
Check Your Understanding Questions 234
Chapter 5 Adjust and Troubleshoot Single-Area OSPF 237
Objectives 237
Key Terms 237
Introduction (5.0.1.1) 238
Advanced Single-Area OSPF Configurations (5.1) 238
Routing in the Distribution and Core Layers (5.1.1) 238
Routing Versus Switching (5.1.1.1) 238
Static Routing (5.1.1.2) 239
Dynamic Routing Protocols (5.1.1.3) 240
Open Shortest Path First (5.1.1.4) 241
Configuring Single-Area OSPF (5.1.1.5) 242
Verifying Single-Area OSPF (5.1.1.6) 244
Configuring Single-Area OSPFv3 (5.1.1.7) 247
Verifying Single-Area OSPFv3 (5.1.1.8) 249
OSPF in Multiaccess Networks (5.1.2) 251
OSPF Network Types (5.1.2.1) 251
Challenges in Multiaccess Networks (5.1.2.2) 253
OSPF Designated Router (5.1.2.3) 255
Verifying DR/BDR Roles (5.1.2.4) 256
Verifying DR/BDR Adjacencies (5.1.2.5) 259
Default DR/BDR Election Process (5.1.2.6) 261
DR/BDR Election Process (5.1.2.7) 262
The OSPF Priority (5.1.2.8) 265
Changing the OSPF Priority (5.1.2.9) 265
Default Route Propagation (5.1.3) 268
Propagating a Default Static Route in OSPFv2 (5.1.3.1) 268
Verifying the Propagated Default Route (5.1.3.2) 269
Propagating a Default Static Route in OSPFv3 (5.1.3.3) 271
Verifying the Propagated IPv6 Default Route (5.1.3.4) 272
Fine-Tuning OSPF Interfaces (5.1.4) 273
OSPF Hello and Dead Intervals (5.1.4.1) 273
Modifying OSPFv2 Intervals (5.1.4.2) 275
Modifying OSPFv3 Intervals (5.1.4.3) 277
Secure OSPF (5.1.5) 279
Routers Are Targets (5.1.5.1) 279
Secure Routing Updates (5.1.5.2) 280
MD5 Authentication (5.1.5.3) 281
Configuring OSPF MD5 Authentication (5.1.5.4) 282
OSPF MD5 Authentication Example (5.1.5.5) 283
Verifying OSPF MD5 Authentication (5.1.5.6) 284
Troubleshooting Single-Area OSPF Implementations (5.2) 286
Components of Troubleshooting Single-Area OSPF (5.2.1) 286
Overview (5.2.1.1) 286
OSPF States (5.2.1.2) 287
OSPF Troubleshooting Commands (5.2.1.3) 288
Components of Troubleshooting OSPF (5.2.1.4) 292
Troubleshoot Single-Area OSPFv2 Routing Issues (5.2.2) 293
Troubleshooting Neighbor Issues (5.2.2.1) 293
Troubleshooting OSPF Routing Table Issues (5.2.2.2) 297
Troubleshoot Single-Area OSPFv3 Routing Issues (5.2.3) 299
OSPFv3 Troubleshooting Commands (5.2.3.1) 299
Troubleshooting OSPFv3 (5.2.3.2) 302
Summary (5.3) 306
Practice 308
Class Activities 308
Labs 308
Packet Tracer Activities 308
Check Your Understanding Questions 309
Chapter 6 Multiarea OSPF 315
Objectives 315
Key Terms 315
Introduction (6.0.1.1) 316
Multiarea OSPF Operation (6.1) 316
Why Multiarea OSPF? (6.1.1) 316
Single-Area OSPF (6.1.1.1) 316
Multiarea OSPF (6.1.1.2) 317
OSPF Two-Layer Area Hierarchy (6.1.1.3) 319
Types of OSPF Routers (6.1.1.4) 320
Multiarea OSPF LSA Operation (6.1.2) 321
OSPF LSA Types (6.1.2.1) 321
OSPF LSA Type 1 (6.1.2.2) 322
OSPF LSA Type 2 (6.1.2.3) 323
OSPF LSA Type 3 (6.1.2.4) 324
OSPF LSA Type 4 (6.1.2.5) 325
OSPF LSA Type 5 (6.1.2.6) 326
OSPF Routing Table and Types of Routes (6.1.3) 326
OSPF Routing Table Entries (6.1.3.1) 327
OSPF Route Calculation (6.1.3.2) 328
Configuring Multiarea OSPF (6.2) 329
Configuring Multiarea OSPFv2 and OSPFv3 (6.2.1) 329
Implementing Multiarea OSPF (6.2.1.1) 329
Configuring Multiarea OSPF (6.2.1.2) 330
Configuring Multiarea OSPFv3 (6.2.1.3) 332
OSPF Route Summarization (6.2.2) 334
OSPF Route Summarization (6.2.2.1) 334
Interarea and External Route Summarization (6.2.2.2) 336
Interarea Route Summarization (6.2.2.3) 338
Calculating the Summary Route (6.2.2.4) 339
Configuring Interarea Route Summarization (6.2.2.5) 340
Verifying Multiarea OSPF (6.2.3) 342
Verifying Multiarea OSPF (6.2.3.1) 342
Verify General Multiarea OSPF Settings (6.2.3.2) 343
Verify the OSPF Routes (6.2.3.3) 345
Verify the Multiarea OSPF LSDB (6.2.3.4) 346
Verify Multiarea OSPFv3 (6.2.3.5) 349
Summary (6.3) 354
Practice 356
Class Activities 356
Labs 356
Packet Tracer Activities 356
Check Your Understanding Questions 356
Chapter 7 EIGRP 361
Objectives 361
Key Terms 361
Introduction (7.0.1.1) 363
Characteristics of EIGRP (7.1) 363
Basic Features of EIGRP (7.1.1) 363
Features of EIGRP (7.1.1.1) 364
Protocol-Dependent Modules (7.1.1.2) 365
Reliable Transport Protocol (7.1.1.3) 367
Authentication (7.1.1.4) 368
Types of EIGRP Packets (7.1.2) 368
EIGRP Packet Types (7.1.2.1) 368
EIGRP Hello Packets (7.1.2.2) 370
EIGRP Update and Acknowledgment Packets (7.1.2.3) 370
EIGRP Query and Reply Packets (7.1.2.4) 372
EIGRP Messages (7.1.3) 373
Encapsulating EIGRP Messages (7.1.3.1) 373
EIGRP Packet Header and TLV (7.1.3.2) 374
Configuring EIGRP for IPv4 (7.2) 377
Configuring EIGRP with IPv4 (7.2.1) 377
EIGRP Network Topology (7.2.1.1) 377
Autonomous System Numbers (7.2.1.2) 379
The Router EIGRP Command (7.2.1.3) 381
EIGRP Router ID (7.2.1.4) 382
Configuring the EIGRP Router ID (7.2.1.5) 384
The network Command (7.2.1.6) 385
The network Command and Wildcard Mask (7.2.1.7) 387
Passive Interface (7.2.1.8) 389
Verifying EIGRP with IPv4 (7.2.2) 392
Verifying EIGRP: Examining Neighbors (7.2.2.1) 392
Verifying EIGRP: show ip protocols Command (7.2.2.2) 393
Verifying EIGRP: Examine the IPv4 Routing Table (7.2.2.3) 396
Operation of EIGRP (7.3) 399
EIGRP Initial Route Discovery (7.3.1) 399
EIGRP Neighbor Adjacency (7.3.1.1) 399
EIGRP Topology Table (7.3.1.2) 400
EIGRP Convergence (7.3.1.3) 401
Metrics (7.3.2) 402
EIGRP Composite Metric (7.3.2.1) 402
Examining Interface Values (7.3.2.2) 405
Bandwidth Metric (7.3.2.3) 406
Delay Metric (7.3.2.4) 408
How to Calculate the EIGRP Metric (7.3.2.5) 409
Calculating the EIGRP Metric (7.3.2.6) 410
DUAL and the Topology Table (7.3.3) 413
DUAL Concepts (7.3.3.1) 413
Introduction to DUAL (7.3.3.2) 413
Successor and Feasible Distance (7.3.3.3) 414
Feasible Successors, Feasibility Condition, and Reported
Distance (7.3.3.4) 415
Topology Table: show ip eigrp topology Command (7.3.3.5) 417
Topology Table: show ip eigrp topology Command (Cont.) (7.3.3.6) 418
Topology Table: No Feasible Successor (7.3.3.7) 420
DUAL and Convergence (7.3.4) 422
DUAL Finite State Machine (FSM) (7.3.4.1) 423
DUAL: Feasible Successor (7.3.4.2) 424
DUAL: No Feasible Successor (7.3.4.3) 426
Configuring EIGRP for IPv6 (7.4) 429
EIGRP for IPv4 Versus IPv6 (7.4.1) 429
EIGRP for IPv6 (7.4.1.1) 429
Comparing EIGRP for IPv4 and IPv6 (7.4.1.2) 430
IPv6 Link-Local Addresses (7.4.1.3) 432
Configuring EIGRP for IPv6 (7.4.2) 432
EIGRP for IPv6 Network Topology (7.4.2.1) 432
Configuring IPv6 Link-Local Addresses (7.4.2.2) 434
Configuring the EIGRP for IPv6 Routing Process (7.4.2.3) 436
The ipv6 eigrp Interface Command (7.4.2.4) 437
Verifying EIGRP for IPv6 (7.4.3) 440
Verifying EIGRP for IPv6: Examining Neighbors (7.4.3.1) 440
Verifying EIGRP for IPv6: show ipv6 protocols Command (7.4.3.2) 441
Verifying EIGRP for IPv6: Examine the IPv6 Routing Table (7.4.3.3) 442
Summary (7.5) 445
Practice 446
Class Activities 446
Labs 447
Packet Tracer Activities 447
Check Your Understanding Questions 447
Chapter 8 EIGRP Advanced Configurations and Troubleshooting 453
Objectives 453
Key Terms 453
Introduction (8.0.1.1) 454
Advanced EIGRP Configurations (8.1) 454
Automatic Summarization (8.1.1) 455
Network Topology (8.1.1.1) 455
EIGRP Automatic Summarization (8.1.1.2) 457
Configuring EIGRP Automatic Summarization (8.1.1.3) 459
Verifying Auto-Summary: show ip protocols (8.1.1.4) 460
Verifying Auto-Summary: Topology Table (8.1.1.5) 462
Verifying Auto-Summary: Routing Table (8.1.1.6) 464
Summary Route (8.1.1.7) 465
Summary Route (Cont.) (8.1.1.8) 466
Manual Summarization (8.1.2) 468
Manual Summary Routes (8.1.2.1) 468
Configuring EIGRP Manual Summary Routes (8.1.2.2) 470
Verifying Manual Summary Routes (8.1.2.3) 471
EIGRP for IPv6: Manual Summary Routes (8.1.2.4) 472
Default Route Propagation (8.1.3) 474
Propagating a Default Static Route (8.1.3.1) 474
Verifying the Propagated Default Route (8.1.3.2) 476
EIGRP for IPv6: Default Route (8.1.3.3) 477
Fine-Tuning EIGRP Interfaces (8.1.4) 478
EIGRP Bandwidth Utilization (8.1.4.1) 479
Hello and Hold Timers (8.1.4.2) 480
Load-Balancing IPv4 (8.1.4.3) 482
Load-Balancing IPv6 (8.1.4.4) 484
Secure EIGRP (8.1.5) 486
Routing Protocol Authentication Overview (8.1.5.1) 486
Configuring EIGRP with MD5 Authentication (8.1.5.2) 488
EIGRP Authentication Example (8.1.5.3) 489
Verify Authentication (8.1.5.4) 491
Troubleshoot EIGRP (8.2) 493
Components of Troubleshooting EIGRP (8.2.1) 493
Basic EIGRP Troubleshooting Commands (8.2.1.1) 493
Components (8.2.1.2) 495
Troubleshoot EIGRP Neighbor Issues (8.2.2) 496
Layer 3 Connectivity (8.2.2.1) 496
EIGRP Parameters (8.2.2.2) 497
EIGRP Interfaces (8.2.2.3) 498
Troubleshoot EIGRP Routing Table Issues (8.2.3) 500
Passive Interface (8.2.3.1) 500
Missing Network Statement (8.2.3.2) 502
Automatic Summarization (8.2.3.3) 504
Summary (8.3) 509
Practice 511
Class Activities 511
Labs 511
Packet Tracer Activities 511
Check Your Understanding Questions 512
Chapter 9 IOS Images and Licensing 517
Objectives 517
Key Terms 517
Introduction (9.0.1.1) 518
Managing IOS System Files (9.1) 518
Naming Conventions (9.1.1) 519
Cisco IOS Software Release Families and Trains (9.1.1.1) 519
Cisco IOS Release 12.4 Mainline and T Trains (9.1.1.2) 519
Cisco IOS Release 12.4 Mainline and T Numbering (9.1.1.3) 521
Cisco IOS Release 12.4 System Image Packaging (9.1.1.4) 522
Cisco IOS Release 15.0 M and T Trains (9.1.1.5) 523
Cisco IOS Release 15 Train Numbering (9.1.1.6) 525
IOS Release 15 System Image Packaging (9.1.1.7) 526
IOS Image Filenames (9.1.1.8) 528
Managing Cisco IOS Images (9.1.2) 531
TFTP Servers as a Backup Location (9.1.2.1) 531
Creating a Cisco IOS Image Backup (9.1.2.2) 531
Copying a Cisco IOS Image (9.1.2.3) 533
Boot System (9.1.2.4) 534
IOS Licensing (9.2) 536
Software Licensing (9.2.1) 536
Licensing Overview (9.2.1.1) 536
Licensing Process (9.2.1.2) 538
Step 1. Purchase the Software Package or Feature to Install (9.2.1.3) 539
Step 2. Obtain a License (9.2.1.4) 539
Step 3. Install the License (9.2.1.5) 541
License Verification and Management (9.2.2) 542
License Verification (9.2.2.1) 542
Activate an Evaluation Right-To-Use License (9.2.2.2) 544
Back Up the License (9.2.2.3) 545
Uninstall the License (9.2.2.4) 546
Summary (9.3) 548
Practice 551
Class Activities 551
Packet Tracer Activities 551
Check Your Understanding Questions 551
Appendix A Answers to the “Check Your Understanding” Questions 555
Glossary 569
TOC, 9781587133282, 2/28/2014