Numbers
2.4 GHz band
2FA (two-factor authentication) ,
3G (third generation)
4G (fourth generation)
5G (fifth generation)
5 GHz band
6 GHz band
802.11 frames and message types –
802.11 frame format –
802.11 message types
client association process
802.11 wireless LANs, radio frequency
amplitude and frequency
RF bands and channels –
Symbols
| format –
A
AAAA records (quad-A records)
AAA (authentication, authorization, and accounting) , –
components
IEEE 802.1X
protocols
absorption
access-class command ,
access layer
access-list command
access ports ,
access VLAN
ACE (access control entry)
ACI (Application-Centric Infrastructure) –
Ack (acknowledgment)
ACLs (access control lists), configuring CPU ACL
active mode (FTP)
active scanning
ad hoc wireless network
advertisement timer (CDP)
AES (Advanced Encryption Standard)
AF (Assured Forwarding) ,
agent-based tools
agentless tools
aggregation layer
AI (Artificial Intelligence) –412
Generative 410
Predictive 410
AMP (Advanced Malware Protection) ,
amplitude
Ansible
AnyConnect (Cisco AnyConnect Secure Mobility Client) ,
APIC (Application Policy Infrastructure Controller)
APIs (application programming interfaces) ,
REST APIs
architecture
cacheable or non-cacheable
client-server
making API calls to Catalyst Center –
stateless
Application Layer
APs (access points)
architectures –
autonomous APs
cloud-based APs
lightweight APs –
operational modes –
outdoor bridge
repeaters
workgroup bridge (WGB)
wireless ,
A records (address records)
ARP ACLs (ARP access control lists)
ARP (Address Resolution Protocol)
DAI and ARP-based attacks
ARP poisoning ,
ARP spoofing ,
arrays (JSON)
AS (authentication server)
attenuation
authentication
WEP encryption and integrity
WEP Open System and Shared Key Authentication
authenticator
authoritative DNS server
autoinstall
automation tools
auto (PoE)
AVC (Application Visibility and Control) ,
AWS (Amazon Web Services)
B
bands
bandwidth ,
bare-metal hypervisors ,
bit-flipping attack
blocks
BOOTP (Bootstrap Protocol)
boot system command
border leaves
botnet ,
Bridge mode
broad network access
brute-force attack ,
BSA (basic service area) ,
BSS (basic service set) –,
distribution system
multiple BSSs
BSSID (basic service set identifier) , ,
burst interval
bursts
C
cable internet
CA (Certificate Authority) ,
cacheable REST APIs
calendar ,
campus LAN architectures –
three-tier LAN architecture
two-tier (collapsed core) LAN architecture –
connecting multiple distribution blocks
Layer 2-Layer 3 border
Capability Codes (CDP)
CAPWAP (Control and Provisioning of Wireless Access Points)
Catalyst Center
making REST API calls to –
CBC-MAC (Cipher Block Chaining Message Authentication Code)
CBWFQ (Class-Based Weighted Fair Queuing) , ,
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
cdp advertise-v2 command
CDP (Cisco Discovery Protocol) –,
configuring –
LLDP (Link Layer Discovery Protocol) –
viewing neighbors –
mapping network with
cdp enable command
cdp holdtime command
cdp run command
cdp timer command
CE (customer edge) routers ,
cell , , , –
centralized Control Plane
chaddr (client hardware address) field
channel number
channels, RF bands and –
2.4 GHz band
5 GHz band
6 GHz band
checksum
CIA triad , –
availability
confidentiality
integrity
CIDR (Classless Inter-Domain Routing)
ciphertext
Cisco IOS (Internetwork Operating System)
as DHCP client
as DHCP server –
address conflicts
configuring DHCP pool –
DHCP client ID
file system –
Cisco Mobility Express
Cisco Wireless Architectures
Class-Based Weighted Fair Queuing (CBWFQ)
classification and marking –
classification
marking –
trust boundaries
clear ip dhcp conflict command
clear ip nat translation command
cleartext
clients
client-server architecture
client/server mode
clock read-calendar command
clock set command ,
clock summer-time command ,
clock timezone command ,
clock update-calendar command
Clos architecture
cloud-based APs
cloud computing –
deployment models –
essential characteristics of
service models
cloud, VRF (Virtual Routing and Forwarding) –
cloud WLC
CNAME records (canonical name records)
collapsed core (two-tier) LAN architecture –
connecting multiple distribution blocks
Layer 2-Layer 3 border
colocation services
Command Prompt
communications, wireless –
community cloud
community strings
configuration drift
configuration management –
automation tools
configuration drift
establishing configuration standards
configuration management tools
Ansible –
Chef 458
Puppet 457–458
Terraform –457
configuring, SSH (Secure Shell) –
conforming traffic
console line
console port security –
line password authentication
user account authentication –
containers, overview , ,
contextual awareness
Control Layer
control tunnel
copy command –
copy running-config startup-config command
copy source destination command
core-distribution layer
core layer
CoS (Class of Service) ,
counter mode encryption
CRUD (Create-Read-Update-Delete) operations
cryptographic keys –
CS (Class Selector) ,
CSMA/CA (Carrier-Sense Multiple Access with Collision Avoidance) ,
CTS (clear-to-send)
D
DA (Destination address)
DAI (Dynamic ARP Inspection) , –
ARP and ARP-based attacks
filtering ARP messages –
inspecting ARP messages –
trusted and untrusted ports
optional checks
rate-limiting ARP messages
data center architectures, spine-leaf –
data formats
JSON –
arrays
identifying invalid JSON –
objects
primitive data types
structured data types –
serialization
XML –
YAML –445
data traffic
data tunnel
datetime keyword
DDoS (distributed denial-of-service) attack ,
debug commands ,
debug ip ospf adj command
debug spanning-tree events command
DECLINE message
deep packet inspection
default file system
default gateway
default-router command
delay, defined
delete command
destination NAT
DevNet
DevOps (development and operations)
DF (Default Forwarding) ,
DHCP (Dynamic Host Configuration Protocol) ,
Cisco IOS as client
Cisco IOS as server –
address conflicts
configuring DHCP pool –
DHCP client ID
DHCP-based attacks
DHCP relay
functions of –
IP settings –
in Linux
in macOS
in Windows
leasing IP addresses with –
relay
DHCP exhaustion attacks ,
DHCP options
DHCP pool
DHCP relay agent
DHCP relay agent information option
DHCP Snooping , –
DHCP option 82 –
filtering DHCP messages –
DHCP message types
DHCP Snooping binding table
inspecting client messages
trusted and untrusted ports
rate-limiting DHCP messages –
DHCP starvation
dictionary attack ,
diffraction
DiffServ (Differentiated Services)
digital certificates
distributed Control Plane
distributed denial-of-service (DDoS) attack
DMVPN (Dynamic Multipoint VPN) ,
DMZ (demilitarized zone)
DNS cache
DNS (Domain Name System)
how DNS works –
hierarchy –
name resolution
record types –
recursive and iterative lookups –
URIs
URLs
on Cisco IOS –
as DNS client
as DNS server –
record types –
DNS propagation delay
DNS server address
dns-server command
domain
name
domain-name command
DoS (denial-of-service) attacks , ,
drop precedence
DSCP (Differentiated Services Code Point) ,
DS (distribution system) ,
DSL (digital subscriber line) ,
DSL filter
DSL modem (modulator-demodulator)
DST (daylight saving time)
DTLS (Datagram Transport Layer Security)
dual-homed design
dual multi-homed design
Duration/ID field
Dynamic ARP Inspection
dynamic IP address
dynamic NAT –
dynamic PAT –
using pool
using interface IP address –
dynamic secure MAC addresses –
E
EAP (Extensible Authentication Protocol) ,
EAP-FAST (EAP-Flexible Authentication via Secure Tunneling)
EAP methods
EAPoL (EAP over LANs)
EAP-TLS (EAP-Transport Layer Security)
east–west traffic
ECN (Explicit Congestion Notification)
EF (Expedited Forwarding) ,
electromagnetic waves
embedded WLC
enable algorithm-type secret
enable command , ,
enable password command ,
enable secret command , , ,
encrypted file transfers
encryption –
GCMP
TKIP
WEP
WLAN security –
GCMP
TKIP
errdisable recovery cause arp-inspection
errdisable recovery cause command
errdisable recovery cause dhcp-rate-limit command
ErrDisable Recovery feature
errdisable recovery interval command
error-disabled port, re-enabling –
error-disabled state
ESS (extended service set) , , ,
exceeding traffic
exec-timeout command , ,
exploits, defined
F
facility
FCC (US Federal Communications Commission)
FCS (Frame Check Sequence)
fiber-optic Ethernet
FIFO (first in, first out) , ,
firewalls and IPS –
next-generation firewalls –
stateful packet filtering
Flex + Bridge mode
FlexConnect Local Auth
FlexConnect Local Switching
FlexConnect mode
forwarding data
Forwarding Plane
four-way handshake ,
FQDN (fully qualified domain name)
Frame Body field
Frame Control field
FS (Forward Secrecy)
FSPL (free-space path loss) ,
FTP commands
FTP control connection
FTP data connection
FTP (File Transfer Protocol) , –
active and passive modes
how it works
transferring files with
upgrading Cisco IOS –
FTPS (File Transfer Protocol Secure)
FTTH (fiber-to-the-home) services
full-mesh topology
G
GARP (gratuitous ARP) replies
GCMP (Galois/Counter Mode Protocol)
GCP (Google Cloud Platform)
GET operation
GHz (gigahertz) ,
global addresses
global routing table
GMAC (Galois Message Authentication Code)
GRE (Generic Routing Encapsulation) ,
over IPsec ,
guest OS
H
hash function
helper address
home router
hostname
host OS
hosts file
HSRP (Hot Standby Router Protocol)
HT (High Throughput) Control field
HTTP (Hypertext Transfer Protocol) –
requests
responses
HTTPS (Hypertext Transfer Protocol Secure) ,
hub-and-spoke topology
hybrid cloud
hybrid topology
hypervisors
hosted
overview
Hz (hertz) ,
I
IaaS (Infrastructure as a Service) , ,
IBN (intent-based networking)
IBSS (independent basic service set) , ,
ICV (integrity check value)
Identifier field
IEEE 802.1X
IEEE 802.11 wireless LANs, radio frequency
ifconfig command ,
Infrastructure Layer
inside addresses
inside hosts
integrity –
GCMP
TKIP
WLAN security –
GCMP
TKIP
interface vlan command
internet connections –
cable internet
DSL (digital subscriber line)
fiber-optic Ethernet
redudant
wireless 3G/4G/5G
internet VPNs –
remote access VPNs
site-to-site VPNs –
invalid JSON –
inventory files
ip access-group command
ip access-list command
ip addr command
IP address
leasing with DHCP –
ip address dhcp command
ip arp inspection limit rate command
ip arp inspection trust command
ip arp inspection validate command
ip arp inspection vlan command
ipconfig /all command
ipconfig command ,
ipconfig /displaydns command
ip default-gateway ip-address command
ip dhcp excluded-address command , ,
ip dhcp pool command
ip dhcp snooping command ,
ip dhcp snooping limit rate command
ip dhcp snooping trust command ,
ip dhcp snooping vlan command ,
ip dns server command
ip domain lookup command
ip domain name command
ip ftp password command ,
ip ftp username command ,
ip helper-address command ,
ip host command
IP (Internet Protocol)
settings –
in Linux
in macOS
in Windows
ip name-server command , ,
ip nat inside command
ip nat inside source list command ,
ip nat inside source static command
ip nat outside command
ip nat pool command
IP phones
IPP (IP Precedence) ,
iproute2 commands
ip route command ,
IPsec (Internet Protocol Security) –,
remote access VPNs
site-to-site VPNs –
DMVPN
GRE over IPsec
IP Service-Level Agreement (IP SLA)
IPS (Intrusion Prevention System) ,
IP SLA (IP Service-Level Agreement)
ip ssh version 2 command
IP telephony –
PoE (Power over Ethernet) –
voice VLANs
IPv4 addresses, private
ip vrf forwarding command
ip vrf command
ISE (Identity Services Engine) ,
ISP (Internet Service Provider)
iterative DNS lookups –
ITU (International Telecommunications Union)
IV (initialization vector)
J
jitter ,
JSON (JavaScript Object Notation) , –
identifying invalid JSON –
primitive data types
structured data types –
arrays
objects
K
key length
key size
key-value pairs
kHz (kilohertz) ,
L
L2VPN (MPLS Layer 2 VPN)
L3VPN (MPLS Layer 3 VPN)
LAGs (link aggregation groups) , , ,
LANs (local area networks) , –
802.11 standards, service sets –
architectures, star and mesh –
campus LAN architectures –
three-tier LAN architecture
two-tier (collapsed core) LAN architecture –
data center architectures, spine-leaf –
SOHO (small office/home office) networks
wireless
amplitude and frequency
BSS (basic service set) –
ESS (extended service set)
IBSS (independent basic service set)
IEEE 802.11 standards –
RF (radio frequency) –
service sets –
Layer 2 discovery protocols
Layer 2 VPNs
Layer 3 VPNs
layers, defined
leaf switches
LEAP (Lightweight EAP)
lease command
leased lines ,
lease renewal
legacy 802.11 security –
WEP encryption and integrity
WEP Open System and Shared Key Authentication
line con 0 command ,
line password authentication
line vty 0 15 command ,
link aggregation groups (LAGs) ,
Linux OS
IP settings
lldp holdtime command
LLDP (Link Layer Discovery Protocol) , –,
configuring and verifying –
viewing neighbors –
lldp reinit command
lldp run command ,
lldp timer command
LLQ (Low Latency Queuing) , ,
local addresses –
Local mode
localtime option
lock-step communication
logging buffer –
logging buffered command , ,
logging console command , , ,
logging [host] ip-address command
logging monitor command , , ,
logging synchronous command
logging trap command ,
login command , ,
login local command , , , ,
loss ,
Low Latency Queuing (LLQ)
LTE (Long-Term Evolution) ,
LWAPP (Lightweight Access Point Protocol)
LWAPs (lightweight access points /APs/) –,
client-serving modes
connecting
network management modes
WLC deployment options
M
mac address-table static command
MAC flooding attacks
Machine learning –
Deep learning
Reinforcement learning 408
Supervised learning 408
Unsupervised learning 408
MAC (media access control)
macOS, IP settings
malware ,
management IP addresses
Management pool
management VLAN
MAP (mesh access point) ,
markup language
MBSS (mesh basic service set) , ,
MD5 (Message Digest 5)
measured service
mesh topologies
MFA (multifactor authentication) ,
MHz (megahertz) ,
MIB (Management Information Database) ,
MIC (message integrity check)
microservices architecture
middleware
minutes-offset argument
MITM (man-in-the-middle) attacks ,
mnemonic
Mobility/RF Group Name setting
modem (modulator/demodulator)
modules
modulus
Monitor mode
more command
MPLS (Multiprotocol Label Switching) –, ,
connecting to service provider
Layer 2 VPNs
Layer 3 VPNs
msec option
Multicast IP Address setting
Multiprotocol
MX records (mail exchange records)
N
NAK (negative ACK) message
name resolution
native hypervisors ,
NAT (Network Address Translation)
concepts –
Cisco terminology
inside and outside
local and global –
process
private IPv4 addresses
types of –
dynamic NAT –
dynamic PAT –
static NAT –
using interface IP address –
using pool
NBAR (Network-Based Application Recognition)
NBI (northbound interface)
nested objects
NETCONF
netmask
Netmiko library
netstat command
netstat -rn command , ,
net-tools command
network automation
benefits of –
SDN (software-defined networking) –
Application-Centric Infrastructure
architecture
Cisco SDN solutions –
Control Plane
Data Plane
logical planes of network devices –
Management Plane
SD-Access
SD-WAN
network command
network components
networking, virtual machines
never mode (PoE)
NGFW (next-generation firewall) –,
NGIPS (next-generation IPS)
NIST (National Institute of Standards and Technology)
NMS (network management station)
N(N-1)/2 formula
no ip dhcp snooping information option command ,
no ip domain lookup command
non-cacheable REST APIs
north–south traffic
no shutdown command , , ,
no switchport
no switchport port-security mac-address sticky command
Notification message class
NS records (name server records)
ntp authenticate command
ntp authentication-key command
ntp broadcast client command
NTP clients
ntp master command –,
ntp multicast client command
NTP (Network Time Protocol)
configuring –
authentication –
client mode –
server mode –
date and time on network devices –
importance of date and time
setting date and time –
how it works –
ntp passive command
ntp peer command ,
ntp server command , , , ,
ntp server key command
ntp server prefer command
NTP servers
ntp source command ,
ntp trusted-key command
ntp update-calendar command
O
objects (JSON)
OID (object identifier)
on-demand self-service
on-premises (on-prem)
solutions
ONT (optical network terminal) ,
ONU (optical network unit) ,
OpenFlow
Open System Authentication
OpFlex
option 82
OSINT (open-source intelligence) ,
OSPF (Open Shortest Path First) ,
outdoor bridge
outside addresses –
outside hosts
overload keyword ,
P
PaaS (Platform as a Service) , ,
PAC (Protected Access Credential)
passive mode (FTP)
passive scanning
password command ,
password-related attacks
passwords and alternatives –
best practices –
Cisco IOS password hashing
password managers
digital certificates
multifactor authentication
PASV command
PATCH operation
path element
PCP (Priority Code Point)
field
PDs (Powered Devices)
PEAP (Protected EAP)
peer relationship ,
PE (provider edge) routers ,
period
per-packet key mixing
PFS (Perfect Forward Secrecy)
PHB (per-hop behavior) ,
phishing
physical access control ,
piggybacking
plaintext
playbook files
PMF (Protected Management Frames)
PNAC (port-based network access control) , ,
pods
PoE (Power over Ethernet) , –
policing, defined
ports and interfaces –
configuring dynamic interfaces
physical ports and logical interfaces –
WLC interfaces
WLC ports
Port Security
configuration options –
secure MAC address aging –
sticky secure MAC addresses
violation modes –
configuring –
configuring static secure MAC addresses
increasing maximum MAC addresses
re-enabling error-disabled port –
DHCP exhaustion and MAC flooding attacks
overview
POST operation
POST (Power-On Self-Test)
POTS (plain old telephone service)
power classification override
power inline auto command
power inline command
power inline police command
power inline static [max milliwatts] command
power policing
PowerShell
P (provider) routers ,
PQDN (partially qualified domain name)
PQ (Priority Queuing) , ,
prefer keyword (NTP) ,
pretexting
primary server (NTP) ,
primitive data types
private cloud deployment
private IPv4 addresses
probe request
proxy mode
PSE (Power Sourcing Equipment)
PSK (pre-shared key) ,
PSTN (public switched telephone network)
PTR records (pointer records)
public cloud deployment
public IPv4 addresses
pull model
push model ,
PUT operation
Q
QoS Control field
QoS (quality of service) ,
classification and marking –
classification
DSCP field –
marking –
trust boundaries
concepts –
bandwidth
delay, jitter, and loss
congestion avoidance –
IP telephony –
PoE (Power over Ethernet) –
voice VLANs
policing
queuing and scheduling –
Class-Based Weighted Fair Queuing
Low Latency Queuing
Priority Queuing
shaping
queue starvation
R
RADIUS (Remote Authentication Dial-In User Service) ,
rapid elasticity, defined
RAP (root access point) ,
RA (Receiver address)
rate-limiting techniques
RC4 (Rivest Cipher 4)
Read message class
read-only OIDs
read request
receiving data
recommended markings
reconnaissance attacks ,
recursive DNS lookups –
RED (Random Early Detection) ,
redundant internet connections
reference clocks ,
reflection
reflection/amplification attacks
refraction
regulatory domain
RELEASE message
reload command
remote access VPNs
remote management
configuring Telnet –
management IP addresses –
repeaters ,
replay attack
resource pooling
Response message class
REST (representational state transfer) APIs , ,
architecture
cacheable or non-cacheable
client-server
stateless
HTTP –
requests
responses
making API calls to DNAC –
reverse DNS lookups
RFC 1918 addresses
RF jamming attack
RF (radio frequency) , , , ,
amplitude and frequency
IEEE 802.11 standards
RF bands and channels –
RF (radio frequency) bands
service sets –
BSS (basic service set) –
ESS (extended service set)
IBSS (independent basic service set)
MBSS (mesh basic service set)
roaming
rogue, defined
Rogue Detector mode
rogue DHCP server
root DNS server
root domain
RO (read-only) community type
routable addresses
route command
routing packets
RSA keys, generating –
RTS (request-to-send)
RTT (round-trip time)
runtime
RW (read-write) community type
S
SaaS (Software as a Service) ,
SAE (Simultaneous Authentication of Equals) –
SA (Source address)
SBI (southbound interface)
scattering, defined
scavenger traffic
scheme (URL)
scrypt, hash algorithm
SD-Access (Software-Defined Access)
SDN (software-defined networking) , –
architecture
Cisco SDN solutions –
logical planes of network devices –
SD-WAN (Software-Defined WAN) ,
secondary servers (NTP) ,
SE-Connect mode
secure MAC addresses
aging –
Secure Shell (SSH). See SSH (Secure Shell)
security
concepts –
firewalls and IPS –
passwords and alternatives –
users access control with AAA –
wireless client authentication –
wireless LANs –
security concepts
summary –
Security Violation Count
Sender IP field
Sender MAC field
sending data
Sequence Control field
sequence numbers (Syslog) –
serialization
service-level agreement (SLA)
service password-encryption command
service providers, MPLS (Multiprotocol Label Switching)
service sequence-numbers command
service sets –
service timestamps log command
service timestamps log datetime command
service timestamps log datetime localtime msec command
service timestamps log datetime msec command
service timestamps log uptime command
setting date and time
configuring daylight saving time/summer time
configuring time zone
setting clock and calendar
severity levels –
SFTP (SSH File Transfer Protocol)
shaping, defined
shaping queue
Shared Key Authentication
show boot command
show calendar command
show cdp command , , ,
show cdp entry command ,
show cdp interface [interface] command –
show cdp neighbors command , , , ,
show cdp neighbors detail command , ,
show cdp traffic command , ,
show clock command ,
show clock detail command
show errdisable recovery command
show file systems command
show hosts command
show interfaces switchport command
show ip dhcp conflict command
show ip dhcp snooping binding command
show ip dhcp snooping command , , ,
show ip interface command
show ip nat statistics command
show ip nat translations command ,
show ip route command
show ip route vrf command
show ip ssh command
show lldp command ,
show lldp entry command
show lldp interface command
show lldp neighbors command
show lldp neighbors detail command
show lldp traffic command
show logging command , ,
show mac address-table command
show memory command
show ntp associations command ,
show ntp status command ,
show port-security address command
show port-security command
show port-security interface command ,
show power inline command ,
show power inline police command ,
show processes cpu command
show running-config command
show startup-config command
show version command
shutdown command , , , ,
single-homed design
site-to-site VPNs –
SLDs (second-level domains)
SMS phishing (smishing)
Sniffer mode
snmp-server community command
snmp-server host command
snmp-server user command
SNMP (Simple Network Management Protocol)
agent
entity
manager
messages –
operations and components –
versions and security –
SNMPv2c (community-based SNMPv2)
SOA records (start of authority records)
social engineering –,
as an exploit
attacks
security program elements
SOHO (small office/home office) networks
source NAT
spear phishing
spine-leaf architecture –
overview of
traditional data center networks
spine switches
split-MAC architecture
spoofed IP address
spoofing attacks
spurious DHCP server
ssh -l command –
SSH (Secure Shell) , , , –
configuring –
console port security –
line password authentication
user account authentication –
generating RSA keys –
remote management –
configuring Telnet –
management IP addresses –
SSIDs (service set identifiers) ,
standards, configuration management, establishing
star topologies
stateful, defined
stateful packet filtering
stateless, defined
stateless firewall
stateless REST APIs
static IP address
static keyword
static NAT –
static mode
static secure MAC addresses –
stations
sticky secure MAC addresses
STP (Spanning Tree Protocol) ,
stratum ,
structured data types –
subdomain
supplicant, defined
SVIs (switch virtual interfaces) ,
switches, initial setup –
switching frames
switchport mode command
switchport port-security aging time command
switchport port-security command
switchport port-security mac-address command
switchport port-security mac-address sticky command
switchport port-security maximum command
switchport port-security violation mode command
switchport voice vlan command
symmetric active mode (NTP)
SYN flood attack
Syslog
device logs –
message format –
over TLS (Transport Layer Security)
T
TACACS+ (Terminal Access Controller Access-Control System Plus) ,
tail drop
tailgating, defined
Talos integration
Target IP field
Target MAC field
TA (Transmitter address)
TCP (Transmission Control Protocol), global synchronization ,
Telnet, configuring –
telnet command
template files
Terminal application
terminal monitor command ,
terminal no monitor command
Terraform –457
TFTP (Trivial File Transfer Protocol) –
how it works
transferring files with –
Cisco IOS file system –
upgrading Cisco IOS –
threats –
social engineering –
technical threats –
three-tier LAN architecture
throughput, defined
THz (terahertz) ,
timestamps (Syslog) –
TKIP (Temporal Key Integrity Protocol)
TLD server
TLDs (top-level domains)
TLS (Transport Layer Security) , , ,
topologies, star and mesh
ToS (Type of Service)
Transfer ID (TID)
transferring files
TFTP –
Cisco IOS file system –
with copy command –
transport input command
trunk ports , , –
trust boundaries
trusted key
trusted ports
TTL (time to live) value
two-tier (collapsed core) LAN architecture –
connecting multiple distribution blocks
Layer 2-Layer 3 border
Type 1 hypervisors
Type 2 hypervisors
U
unbounded medium
unified WLC
untrusted ports
upgrading Cisco IOS –
uptime option
URIs (Uniform Resource Identifiers) ,
URLs (Uniform Resource Locators)
URNs (Uniform Resource Names)
user account authentication −
user awareness programs ,
username command , ,
username username algorithm-type secret command
users
access control with AAA –
components
IEEE 802.1X
protocols
user training programs
UTC (Coordinated Universal Time)
uWGB (Universal WGB)
V
variables ,
violation modes –
virtualization
cloud and
containers
VMs (virtual machines) –
VRF (Virtual Routing and Forwarding) –
virtual switches ,
vishing (voice phishing)
VMM (virtual machine monitor) ,
VMs (virtual machines)
hypervisors
networking virtual machines
overview –,
vNICs (virtual network interface cards) ,
voice phishing (vishing)
voice VLANs
VoIP (Voice over IP) ,
VPNs (virtual private networks) , ,
overview
VPN client ,
VRF (Virtual Routing and Forwarding) , , –,
VTY (Virtual Teletype) lines
vulnerabilities
VXLAN (Virtual Extensible LAN)
W
WANs (wide area networks) ,
architectures
concepts –
leased lines
MPLS (Multiprotocol Label Switching) –
internet VPNs –
remote access VPNs
site-to-site VPNs –
internet connections –
cable internet
DSL
fiber-optic Ethernet
redundancy
wireless 3G/4G/5G
WAPs (wireless access points) ,
weighted round-robin
WEP (Wired Equivalent Privacy) –
WGB (workgroup bridge) ,
whaling, defined
whitespace
WHOIS lookup
Wi-Fi
Wi-Fi Protected Access (WPA)
Wi-Fi router
Windows OS, IP settings
wireless architectures
802.11 frames and message types –
wireless communications –
wireless router
WLANs (wireless LANs) –, –
configuration
configuring –
advanced settings
connecting LWAPs
QoS settings
security settings
initial setup
connecting to WLC –
configuring CPU ACL
management connections –
switch configuration –
WLC initial configuration –
radio frequency –
IEEE 802.11 standards
security
encryption and integrity –
GCMP
TKIP
wireless client authentication –
WPA-Enterprise –
WPA-Personal
security concepts –
CIA triad in –
legacy 802.11 security –
WLCs (wireless LAN controllers) , , ,
connecting to –
deployment options
discovery process
initial configuration –
ports and interfaces –
WPA-Enterprise , –
WPA-Personal
WPA (Wi-Fi Protected Access) , ,
WRED (Weighted Random Early Detection) ,
write command
write memory command
Write message class
write request
www domain name
X
XaaS (anything as a service)
XML (Extensible Markup Language) –
Y
YAML (YAML Ain’t Markup Language) –