List of Tables

Chapter 1. Before you begin

Table 1.1. Minimum physical lab requirements

Chapter 2. What is a Cisco network?

Table 2.1. Switch1’s MAC address table

Table 2.2. Determining the broadcast domain based on the IP address and subnet mask

Table 2.3. The database server’s IP address is in a different subnet than my computer’s IP address.

Chapter 3. A crash course on Cisco’s Internetwork Operating System

Table 3.1. Commands used in this chapter

Chapter 4. Managing switch ports

Table 4.1. Commands used in this chapter

Chapter 5. Securing ports by using the Port Security feature

Table 5.1. Port Security levels

Table 5.2. Sample MAC address table

Table 5.3. MAC address table

Table 5.4. Commands used in this chapter

Chapter 6. Managing virtual LANs (VLANs)

Table 6.1. Commands used in this chapter

Chapter 7. Breaking the VLAN barrier by using switched virtual interfaces

Table 7.1. Subnets and corresponding VLANs

Table 7.2. Subnet address and subnet mask

Table 7.3. Subnet address and subnet mask

Table 7.4. SVI IP addresses and subnet masks

Table 7.5. Commands used in this chapter

Chapter 8. IP address assignment by using Dynamic Host Configuration Protocol

Table 8.1. DHCP scopes, options, and lease times for each VLAN

Table 8.2. IP addresses that DHCP will not assign

Table 8.3. DHCP scope, options, and lease time for VLAN 600

Table 8.4. Commands used in this chapter

Chapter 9. Securing the network by using IP access control lists

Table 9.1. Prototype rule to deny traffic from HR-PC1 to Executive-PC1

Table 9.2. ACL 100 with the implicit deny rule

Table 9.3. ACL rules to block IP traffic to an entire subnet

Table 9.4. Subnet mask to wildcard mask conversion

Table 9.5. Commands used in this chapter

Chapter 10. Connecting switches using trunk links

Table 10.1. Commands used in this chapter

Chapter 11. Automatically configuring VLANs using the VLAN Trunking Protocol

Table 11.1. Commands used in this chapter

Chapter 12. Protecting against bridging loops by using the Spanning Tree Protocol

Table 12.1. Commands used in this chapter

Chapter 13. Optimizing network performance by using port channels

Table 13.1. Commands used in this chapter

Chapter 14. Making the network scalable by connecting routers and switches together

Table 14.1. Router1’s (sub)interfaces, IP addresses, and corresponding VLANs

Table 14.2. DHCP scopes, options, and lease times for each VLAN

Table 14.3. Commands used in this chapter

Chapter 15. Manually directing traffic using the IP routing table

Table 15.1. Transit subnets; by using a subnet mask of 255.255.255.252, each transit subnet is big enough for only two devices.

Table 15.2. Commands used in this chapter

Chapter 16. A dynamic routing protocols crash course

Table 16.1. Commands used in this chapter

Chapter 17. Tracking down devices

Table 17.1. Interfaces and IP addresses for Switch1, Switch2, and Router1

Table 17.2. Commands used in this chapter

Chapter 18. Securing Cisco devices

Table 18.1. Commands used in this chapter

Chapter 19. Facilitating troubleshooting using logging and debugging

Table 19.1. Commands used in this chapter

Chapter 20. Recovering from disaster

Table 20.1. Commands used in this chapter

Chapter 21. Performance and health checklist

Table 21.1. Commands used in this chapter