Books & Videos

Table of Contents

  1. Chapter 1 Fixing Physical Networks: Walking on Wires

    1. Coconut Airways has a network problem

    2. How do we fix the cable?

    3. Introducing the CAT-5 cable

    4. The CAT-5 cable dissected

    5. So what’s with all the colors?

    6. Let’s fix the broken CAT-5 cable

    7. A closer look at the RJ-45 connector

    8. So what are the physical steps?

    9. You fixed the CAT-5 cable

    10. Coconut Airways has more than one network

    11. Introducing the coaxial cable

    12. Coaxial networks are bus networks

    13. So can we fix the cable?

    14. The network’s still not working

    15. So what goes on inside a coaxial cable?

    16. What about connectors and terminators?

    17. Use toner-tracer sets to listen to electrons

    18. No sound means no electrons

    19. You’ve fixed the coaxial cable

    20. Introducing fiber-optic cables

    21. The Coconut Airways cable’s over-bent

    22. How to fix fiber-optics with a fusion splicer

    23. A fiber-optic connector needs fitting too

    24. We’re nearly ready to fix the connector

    25. There are two types of fiber

    26. Which mode fiber should you use?

    27. Let’s fit the connector on the fiber-optic

    28. Coconut Airways is sky high

  2. Chapter 2 Planning Network Layouts: Networking in the Dark

    1. Ghost Watch needs your help!

    2. Every good network needs a good plan

    3. So how does the device list help us plan a network?

    4. How to plan a network layout

    5. Let’s plan the cabling with a floorplan

    6. Ready to plot some network cables?

    7. So where have we got to?

    8. We need to decide on the cable management hardware

    9. Uh oh! The cabling is a mess

    10. Ghost Watch needs cable management hardware

    11. Things that go bump...

    12. You’ve really cleaned up that noise and straightened out MOST of the cables!

    13. Let’s start by labeling the cables

    14. But there are still lots of cables

    15. So what’s a patch panel?

    16. Behind the scenes of a patch panel

    17. The wires go into a punch down block

    18. Roll the cameras!

  3. Chapter 3 Tools and Troubleshooting: Into the Wire

    1. Mighty Gumball won the Super Bowl contract

    2. A toner and tracer can check for a signal...

    3. ... but can’t check for signal quality

    4. Introducing the multimeter

    5. So what’s resistance?

    6. So how well did the multimeter do?

    7. An oscilloscope shows voltage changes

    8. Voltage is really electrical pressure

    9. Where does noise on network cables come from?

    10. So how well did the oscilloscope perform for Mighty Gumball?

    11. A logical analyzer uses voltage too

    12. When is a logical analyzer useful?

    13. So which tool is best?

    14. The Mighty Gumball bonus went to Jill

    15. A LAN analyzer combines the functions of all the other tools

    16. A LAN analyzer understands the network traffic in the signal

    17. So which tool is best?

    18. The Mighty Gumball problems are fixed!

  4. Chapter 4 Packet Analysis: You’ve Been Framed

    1. What’s the secret message?

    2. Network cards handle encoding

    3. To get the message, reverse the encoding

    4. The Ethernet standard tells hardware how to encode the data

    5. A quick guide to binary

    6. Computers read numbers, humans read letters

    7. Hexadecimal to the rescue

    8. We can convert to ASCII using hex

    9. Back at the spy agency...

    10. Protocols define the structure of a message

    11. Network frames have lots of layers

    12. Your friendly packet field guide

    13. So can we decode the secret message?

    14. We’ve got all the right packets... but not necessarily in the right order

    15. The packet tells you the correct order

  5. Chapter 5 Network Devices and Traffic: How Smart is Your Network?

    1. You’ve decoded the secret message...

    2. The packet information tells us where the packet came from

    3. So who’s the mole?

    4. There’s more to networks than computers

    5. Hubs don’t change the MAC address

    6. A hub sends signals, and sends them everywhere

    7. So what passed the signal to the hub?

    8. A switch sends frames, and only sends them where they need to go

    9. Switches store MAC addresses in a lookup table to keep the frames flowing smoothly

    10. The switch has the information...

    11. We can use software to monitor packets

    12. Let’s hook Wireshark up to the switch

    13. Wireshark gives us traffic information

    14. Routers have MAC addresses too

    15. We’re closing in!

    16. You’ve found the mole!

  6. Chapter 6 Connecting Networks with Routers: Bringing Things Together

    1. Networking Walking on the moon

    2. We need to connect two networks together

    3. The light’s on, but nobody’s home

    4. Let’s see what traffic is on our network!

    5. MAC address versus IP address

    6. IP addresses give our networks a sense of location, and network nodes a sense of belonging to that location

    7. We retrieve IP addresses using the MAC address and the Address Resolution Protocol (ARP)

    8. So what’s the problem with the Moonbase?

    9. How do we get network traffic to move between networks?

    10. How the router moves data across networks

    11. Back to the Moonbase problem

    12. The secret of IP numbers is...

    13. Routers connect networks by doing the math...

    14. Back at the Moonbase...

    15. Are you ready to program the router?

    16. You just created this router config file!

    17. Let the router tell us what’s wrong...

  7. Chapter 7 Routing Protocols: It’s a Matter of Protocol

    1. Houston, we have a problem...

    2. Routing tables tell routers where to send packets

    3. Each line represents a different route

    4. So how do we enter routes?

    5. Routes help routers figure out where to send network traffic

    6. So are the moonbases now connected?

    7. Back on the moon...

    8. So how do we troubleshoot bad routes?

    9. The traceroute command is useful too

    10. So what’s the problem with the network connection?

    11. The network address changes keep on coming...

    12. Use RIP to get routes to update themselves

    13. So how do we set up RIP?

    14. But there’s still a problem...

    15. There are too many hops

    16. The routing protocol zoo

    17. So how do we setup EIGRP?

    18. We have lift off!

  8. Chapter 8 The Domain Name System: Names to Numbers

    1. The Head First Health Club needs a website

    2. Hello, my domain name is...

    3. Let’s go buy a domain name

    4. Uh-oh! We’re in trouble

    5. Introducing the DNS

    6. The DNS relies on name servers

    7. How the DNS sees your domain

    8. So how does this affect the Health Club?

    9. First install a DNS name server...

    10. ...then configure the name server

    11. The anatomy of a DNS zone file

    12. Here’s what the DNS zone file tells us about the Health Club servers

    13. The Health Club can’t send emails

    14. So what’s the problem?

    15. Email servers use RDNS to fight SPAM

    16. Check your sources with reverse DNS

    17. The dig command can do a reverse DNS lookup

    18. Your name server has another important zone file...

    19. The emails are working!

  9. Chapter 9 Monitoring and Troubleshooting: Listen to Your Network’s Troubles

    1. Pajama Death are back on tour

    2. So where would you start troubleshooting a misfiring network?

    3. Start troubleshooting your network problems by checking in with your network devices

    4. Troubleshoot network connectivity with the ping command

    5. If the ping fails, check the cables

    6. Get started with the show interface command

    7. The ticket network’s still not fixed

    8. SNMP to the rescue!

    9. SNMP is a network admininistrator’s communication tool

    10. How to configure SNMP on a Cisco device

    11. One hour to go...

    12. Get devices to send you their problems

    13. How to configure syslogd on a Cisco device

    14. How do you tell what’s in the logs?

    15. Too much information can be just as bad as not enough

    16. How do you know which events are important?

    17. Pajama Death’s a sell-out!

  10. Chapter 10 Wireless Networking: Working Without Wires

    1. Your new gig at Starbuzz Coffee

    2. Wireless access points create networks using radio waves

    3. Let’s fit the wireless access point

    4. What about the network configuration?

    5. So what’s DHCP?

    6. First make sure the client has DHCP turned on...

    7. Second, make the wireless access point a DHCP server...

    8. ...and then specify an acceptable range of IP addresses

    9. So has setting up DHCP solved the problem?

    10. This time it’s personal

    11. We’ve run out of IP addresses

    12. NAT works by reallocating IP addresses

    13. So how do we configure NAT?

    14. So has this fixed the problem?

    15. There’s more than one wireless protocol

    16. The central Starbuzz server needs to access the cash register

    17. Port mapping to the rescue!

    18. Let’s set up port mapping on the Starbuzz access point

    19. The wireless access point is a success!

  11. Chapter 11 Network Security: Get Defensive

    1. The bad guys are everywhere

    2. And it’s not just the NETWORK that gets hurt...

    3. The big four in network security

    4. Defend your network against MAC address spoofing

    5. So how do we defend against MAC address spoofing?

    6. Defend your network against ARP poisoning attacks

    7. So what can we do about ARP poisoning attacks?

    8. It’s all about the access, baby!

    9. Set up your router’s Access Control Lists to keep attackers out

    10. So how do we configure the Access Control List?

    11. Firewalls filter packets between networks

    12. Packet-filtering rules!

    13. Master the static packet filter

    14. Get smart with stateful packet-filters

    15. Humans are the weakest link in your security chain

    16. So how do social engineers operate?

    17. Smash social engineering with a clear and concise security policy

    18. You’ve hardened your network

  12. Chapter 12 Designing Networks: You Gotta Have a Plan!

    1. Now you have to plan a network from scratch!

    2. You have to know what the needs are before you can plan

    3. So you’ve developed your questions, now what?

    4. Look at your action plan

    5. So you have a physical layout, what’s next?

    6. Blueprints show everything in a building’s design

    7. You may have to modify your network design based on what you see in the blueprints!

    8. So you’ve got your physical network layout, what’s next?

    9. Finally, you need an implementation plan

    10. Leaving town...

    11. It’s been great having you here in Networkville!

  1. Appendix Leftovers: The Top Ten Things (we didn’t cover)

    1. #1 Network topologies

    2. #2 Installing Wireshark

    3. #3 How to get to the console or terminal

    4. #4 The TCP Stack

    5. #5 VLANS

    6. #6 Cisco IOS Simulators

    7. #7 BGP

    8. #8 VPN

    9. #9 Intrusion Detection Systems

    10. #10 Cisco Certification

  2. Appendix Ascii Tables: Looking Things Up

    1. ASCII tables 0-31

    2. ASCII code tables 32-63

    3. ASCII code tables 64-95

    4. ASCII code tables 96-127

  3. Appendix Installing Bind: Getting a Server to talk DNS

    1. #1 Installing BIND on Windows (XP, 2000, Vista)

    2. #2 Installing BIND Mac OS X Server

    3. #3 Installing BIND Mac OS X Client & Linux