What is the purpose of this document?
Anatomy of a crosswalkCCENT exam objective: Target activity in content: Target lab in content: Enrichment activity in ICG:
1. Determine the exam objective to be addressed 2. Locate supporting activities and labs in the content: Example: 3.5.3.1 = Chapter 3, objective 5.3, page 13. Locate further explanations and extension activities in the chapter ICG
Abbreviations Go to this site for more ideas on embedding CCENT activities in instruction:ICG: Interactive Course GuidePT: Packet TracerVoD: Video on Demand
Using this crosswalkBefore beginning a chapter…
check ICG for crosswalk extension activitiescheck exam objectives for related activities and labs
When reviewing for quizzes and tests…check key activities and labs noted in the crosswalk
When preparing students for the CCENT…use activites, labs and extensions for review
Where the crosswalk indicates NO related activities or labs…target these areas for development of your own review activities
This document aligns each of the CCENT exam (ICND1 #640-822) objectives to specific activities and labs in the CCNA Discovery 1 (Networking for Home and Small Businesses) and CCNA Discovery 2 (Working at a Small-to-Medium Business or ISP) curricula, as well as to enrichment activities from the ICGs.
Assign and verify valid IP addresses to hosts, servers, and networking devices in a LAN environment
3.5.3.1: View IP configurations on hosts
3.5.2.2: IP addresses and network communication
Ch. 3.5 Reflection 02 #2: create a preliminary network addressing plan for a company LAN
https://cisco.webex.com/cisco/onstage/g.php?p=821&t=m Access and play back webinar recordings for the series, Preparing Students for CCENT Success, as well as links to session materials.
Go to this site for more ideas on embedding CCENT activities in instruction:
This document aligns each of the CCENT exam (ICND1 #640-822) objectives to specific activities and labs in the CCNA Discovery 1 (Networking for Home and Small Businesses) and CCNA Discovery 2 (Working at a Small-to-
https://cisco.webex.com/cisco/onstage/g.php?p=821&t=m Access and play back webinar recordings for the series, Preparing Students for CCENT Success, as well as links to
CCENT ObjectiveChapter Content Alignment
CCNA Discovery 1Activities Labs
Describe the operation of data networks.1.5.3.4: Installing a printerDescribe the purpose and functions of various
network devices1.2.2.4: Servers, desktops and workstations 3.1.3.2: Identify network components 3.1.5.2: Identify roles of client and server
Select the components required to meet a given network specification
3.1.3.2: Basic network components
3.1.5.3: Building a simple peer-to-peer network 3.6.2.3: Prototype a simple network (PT) Capstone Project, Activities 1,2
Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network
6.3.3.3: Match items to OSI layers 6.3.3.4: Build and send a frame
6.3.3.5: View PDU information (PT)
Describe common networking applications, including web applications
6.1.1.4: Match service to client request
3.5.7.2: Observe ARP, broadcast and ICMP traffic on a network (PT) 3.6.5.3: Map a network drive 6.2.3.3: Explore FTP 6.2.4.4: Configure an email client
Describe the purpose and basic operation of the protocols in the OSI and TCP models
6.1.3.4: Distinguish between characteristics of TCP and UDP 6.3.2.3: Match items to TCP/IP layers
6.3.3.5: View PDU information (PT)
Describe the impact of applications (Voice over IP and Video over IP) on a network
6.1.3.4: Distinguish between characteristics of TCP and UDP
Interpret network diagrams
Implement a small switched network.
3.1.6.1, 3.6.1.2: Distinguish between physical and logical topology diagrams 3.5.5.2: Identify LANs in a given diagram
3.5.7.1: Learn to use Packet Tracer (PT) Capstone Project, Activity 1
Determine the path between two hosts across a network
3.4.2.3: Determine paths between hosts using a hub 3.4.3.4: Determine paths between hosts using hubs and switches
3.5.7.2: Build a two-host hubbed network and observe data traffic. (PT) 4.2.3.2: Create and observe packet flow between source and destination hosts over the Internet. (PT)
Describe the components required for network and Internet communications
3.1.3.1: Basic network components 3.3.7.2: Determine components needed for specific scenarios
4.2.3.2: Create and observe packet flow between source and destination hosts over the Internet. (PT) Capstone Project, Step 2
Identify and correct common network problems at Layers 1, 2, 3, and 7 using a layered model approach
9.1.3.3: Match scenario to troubleshooting approach
9.2.3.2: Verify Layer 3 configuration on a host (PT) 9.2.4.3: Use ping to verify connectivity (PT)
Differentiate between LAN/WAN operation and features
3.5.5.1: View different LAN types 3.5.5.2: Count local networks within a LAN 4.2.2.1: View email packet flow 4.3.1.1: View data transfer between source and destination on the Internet
4.2.3.2: Forward packets across the network (PT) 4.2.3.3: Trace Internet connectivity
Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts
3.6.2.3: Prototype a switched network (PT) 3.6.4.3: Connect hosts to a Linksys router
Explain the technology and media access control method for Ethernet technologies
3.3.3.1: View the process of sending a frame on an Ethernet network 3.3.4.1: Build an ethernet frame 7.2.4.2: View the reservation process for CSMA/CA
3.3.3.2: Determine the MAC address of a host
Explain network segmentation and basic traffic management concepts
3.4.3.4: Describe various types of traffic issues on a network using both switches and a hub 3.5.5.1: View and study reasons for segmenting networks 5.2.3.4: Distinguish between unicast, broadcast and multicast traffic handling
Explain the operation of Cisco switches and basic switching concepts
3.4.5.1: Determine how a switch forwards a frame
Perform, save and verify initial switch configuration tasks, including remote access management
3.6.2.3: Prototype a simple switched network; verify using ping
Verify network status and switch operation using basic utilities, including ping, traceroute, Telnet, SSH, ARP, ipconfig, show and debug commands
3.4.7.1: View the use of ARP in sending frames to destinations
9.3.3.2: Troubleshoot physical connectivity and verify using ping
Implement and verify basic security for a switch (port security, deactivate ports)
Implement an IP addressing scheme and IP services to meet network requirements for a small branch office.
Describe and verify DNS operation
Identify, prescribe, and resolve common switched-network media issues, configuration issues, autonegotiation, and switch hardware failures
9.3.3.2: Troubleshoot various physical connectivity problems
Describe the need and role of addressing in a network; create and apply an addressing scheme to a network
3.5.2.1: View the use of MAC and IP addresses in creating a network frame 5.1.3.2: Drag and drop PCs to place them in correct networks
3.5.2.2: IP addresses and network communication Capstone Project, Activity 9
Assign and verify valid IP addresses to hosts, servers, and networking devices in a LAN environment
5.1.4.1: View interaction between IP address and subnet mask
3.5.2.2: IP addresses and network communication Capstone Project, Activity 9
Explain the basic uses and operation of NAT in a small network connecting to one ISP
5.2.2.3: Describe how an ISP handles public and private IPs 5.4.3.1: View NAT operations
5.4.3.2: Examine NAT on a multi-function device(PT)
6.2.1.2: View DNS client-server interaction
Lab 6.2.1.3: Observe DNS name resolution
Identify and correct IP addressing issues
Implement a small routed network
Describe the operation and benefits of using private and public IP addressing
5.4.3.1: View NAT operations
5.4.3.2: Examine NAT on a multi-function device(PT)
Enable NAT for a small network with a single ISP and connection using SDM and verify operation using CLI and ping
5.4.3.2: Examine NAT on a multi-function device(PT)
Configure, verify and troubleshoot DHCP and DNS operation on a router, using the CLI and SDM
9.3.6.2: Determine whether a DHCP problem is related to the wired, wireless, or both parts of the network
5.3.3.3: Configure a DHCP server and client (PT)
Implement static and dynamic addressing services for hosts in a LAN environment
5.3.3.3: Configure a DHCP server and client (PT)
5.1.3.2: Match host IPs to their correct network
9.2.3.2: Verify Layer 3 configuration on a host (PT)
Describe basic routing concepts, including packet forwarding and the router lookup process
3.5.2.3: View a router forwarding packets 3.5.4.3: Determine how a router forwards a packet
Describe the operation of Cisco routers, including the router bootup process, POST, router components
3.5.4.1: Examine tables maintained by routers 3.6.3.1: View the functionality of a Linksys router 3.6.4.1: Identify components of a Linksys router
Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts
3.5.7.2: Create a small LAN and observe traffic (PT) 3.6.2.3: Prototype a small LAN (PT) 9.3.3.2: Troubleshoot physical connectivity
Configure, verify, and troubleshoot RIPv2
Manage the Cisco IOS software
Implement password and physical security
Access and utilize the router CLI to set basic parameters
Connect, configure, and verify operation status of a device interface
9.2.3.2: Troubleshoot using ipconfig (PT) 9.3.3.2: Troubleshoot connectivity problems
Verify device configuration and network connectivity using ping, traceroute, Telnet, SSH, and other utilities
9.2.2.1: Study software utilities for troubleshooting connectivity
4.2.3.2: Use ping and traceroute to check connectivity(PT) 4.2.3.3: Use a variety of utilities and tools to trace packet forwarding through the Internet
Perform and verify routing condfiguration tasks for a static or default route given specific routing requirements
Manage Cisco IOS configuration files, including saving, editing, upgrading, restoring
7.4.3.2: Use Linksys GUI to back up and restore a configuration file 7.4.4.2: Use Linksys GUI to upgrade firmware
7.4.4.2: Use Linksys GUI to upgrade firmware
7.3.5.2: Configure wireless security on an AP
Explain and select the appropriate administrative tasks required for a WLAN.
Identify security threats to a network and describe general methods to mitigate those threats.
Verify network status and router operation using basic utilities, including ping, traceroute, Telnet, SSH, ARP, ipconfig, and show and debug commands
9.2.2.1: Compare the type of problem verified by each utility
9.2.3.2: Troubleshoot using the ipconfig command (PT) 9.2.4.3: Troubleshoot using the ping command 9.2.7.2: Troubleshoot using network utilities
Describe standards associated with wireless media, including IEEE WI-FI Alliance, ITU/FCC
7.1.1.1: Compare IR, RF, and Bluetooth 7.2.1.2: Compare WLAN standards
Identify and describe the purpose of the components in a small wireless network, including SSID, BSS, ESS
7.2.2.3: Match component to its functionality
7.2.6.4: Configure a wireless client
Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point
7.2.3.4: Configure SSID on an AP using GUI 7.2.4.3: Configure channels using Linksys GUI 7.4.3.2: Backup and restore configs using Linksys GUI 7.4.4.2: Update firmware using Linksys GUI
7.2.5.3: Configure basic functionality on an AP 7.2.6.4: Configure a wireless client
Compare and contrast wireless security features and capabilities of WPA security, including open, WEP, WPA-1/2
7.3.3.2: Compare functions of PSK and EAP 7.3.4.3: Configure encryption using Linksys GUI
7.3.5.2: Create a security plan and configure security on an AP
Identify common issues when implementing wireless networks
9.3.4.2: View the impact of adding hosts to a WLAN
9.3.5.2: Troubleshoot a wireless network (PT)
Implement and verify WAN links.
Explain today’s increasing network security threats and the need to implement a comprehensive security policy to mitigate the threats
8.1.1.2: Describe various security threats 8.3.1.1: Identify parts of a security policy
Explain general methods to mitigate common security threats to network devices, hosts, and applications
8.3.1.2: Identify common security measures 8.3.5.2: Identify the purpose of various security tools
8.4.3.2: Perform vulnerability analysis
Describe the functions of common security appliances and applications
8.3.5.2: Identify the purpose of various security tools 8.4.1.2: Study various types of firewalls
2.3.3.2: Examine OS and application patches 8.4.3.2: Perform vulnerability analysis
Describe security recommended practices, including initial steps to secure network devices
8.4.4.1: Identify security best practices
8.4.2.4: Configure firewall settings using Linksys GUI
Describe different methods of connecting to a WAN
4.1.4.2: Describe various types of Internet connections 4.3.2.3: Describe devices in Internet cloud
Configure and verify a basic WAN serial connection
Chapter Content AlignmentCCNA Discovery 1 CCNA Discovery 2
ICG Extensions Activities Labs
Ch. 1: Personal computer VoD Ch. 1.2 Reflections 01, 02, 03: research on mainframes, servers, and PDAs Ch. 3: Networking Concepts VoD
5.4.1.1: Study a configuration checklist 5.5.1.2: Study a 2960 switch 5.1.1.1: Compare features of various ISRs
3.3.3.4: Explore different LAN switch options (PT) 3.3.4.3: Explore different internetworking device options (PT)
Ch. 3.6 Reflection #1: prototype a network designed in a previous reflection activity (PT)
3.2.1.4: Identify phases in network upgrade planning 3.3.1.1: Describe factors involved in equipment selection
3.2.4.2: Create a cabling upgrade proposal
Ch. 6.3 Reflection #2: use article Basic Journey of a Packet to draw diagrams of data flow
2.2.1.1: View functions of the OSI model layers 9.1.1.3: Match layers to devices, protocols and technologies
9.1.1.4: Organize CCENT exam objectives by OSI layers
Ch. 4: Connecting to the Internet through an ISP VoD Ch. 6: Network Services VoD
1.1.1.1: Describe common business uses of networking 7.4.1.2: Match protocols to associated network servers
7.3.3.2: Examine a DNS server
Ch. 6.3 Reflection #3: play the OSI game
2.2.2.4: Match protocols to their OSI layers 7.2.3.3: Describe differences between TCP and UDP
Ch. 6: Network Services VoD Ch. 6.2 Reflection #5: Research requirements, potential problems, and benefits of VoIP
1.1.1.1: Describe business applications of VoIP
Ch. 3.1 Reflection 01: Diagram networks students have used
3.1.2.1: Compare physical and logical network diagrams 3.1.2.2: Compare common network topologies
3.1.3.2: Create physical and logical diagrams (PT) 3.2.4.2: Evaluate a floor plan and propose upgrades 10.0.1, Part C, Step 3
Ch. 3.1 Activity #3: based on photographs/scenarios of home and office networks, students draw and label pathways for data to follow
2.3.1.4: Troubleshoot and resolve a connectivity issue between two hosts
Ch. 3.2 Reflection 01: students encode/decode communications using protocol "rules" they determine; students research communication processes, like sign language and Morse code
3.1.3.2: Create physical and logical diagrams (PT) 10.0.1, Part C
Ch. 6.3 Reflection #5: create and present troubleshooting problems and figure out which OSI layer is involved Ch. 9: Troubleshooting your Network VoD
2.2.3.5: Identify the layer on which a problem occurs
2.3.1.4: Troubleshoot and correct network issues (PT)
Ch. 4.2 Reflection 01: download various types of packets, and analyze packet size, path, hops and transmission time
1.2.2.1: View operations of the Internet backbone 1.2.2.2: View differences between Tier 1, 2 and 3 ISPs
1.2.3.3: Use tools to map the Internet
Ch. 4.5 Reflection: research evolving standards and implementations of cabling; research TIA termination standards
3.2.1.2: Compare uses of various network cables 5.5.4.1: View cabling needed to connect a switch to a router
5.5.4.4: Use a configuration checklist to connect a switch to a LAN (PT)
Ch. 3.2 Reflection 01: students select a type of business and determine unicast, broadcast, and multicast messages needed for it Ch. 3.3 Reflection 01: research "new Ethernet" and naming schemes
5.5.1.3: Compare half-and full-duplex operations
9.2.4.4: Troubleshoot link connectivity issues related to switch technology
Ch. 3.4 Reflection 01: explain to the boss why switches should be used rather than hubs in a large network; develop the implementation plan Ch. 3.5 Reflection 02: Prepare a preliminary network expansion plan
4.1.3.3: View segmentation of a network using subnets
9.2.4.3: Configure and troubleshoot duplex mismatches on a switched network (PT)
Ch. 3.4 Discussion 03: Prepare a flow chart of collision operations in a switched network
5.5.5.1: View CDP commands
5.5.5.2: Use CDP as a network discovery tool
5.5.3.3: Perform initial switch configuration (e-lab)
5.5.2.2: Perform initial switch startup 5.5.3.4: Perform initial switch configuration (PT)1.2.3.4 Interpret ping and traceroute output (PT) 5.5.4.5: Connect, configure and verify operations on a 2960 switch
5.5.4.2, 5.5.4.3: View command sequences for switch port security
5.5.4.5: Connect, configure and verify operations on a 2960 switch 10.0.1, Part F
Implement an IP addressing scheme and IP services to meet network requirements for a small branch office.
9.2.4.1, 4.2: Study LAN connectivity issues centered on switches
5.5.4.4: Use a configuration checklist to connect a switch to a LAN (PT) 9.2.4.3: Configure and troubleshoot duplex mismatches on a switched network (PT)
Ch. 3.4 Reflection 02 #3: practice building ARP tables Ch. 5: Addressing Basics VoD Ch.3.5 Reflection 01: Routers and gateways Ch. 3.5 Reflection 01 #1: experiment with IP addressing and gateways Ch. 5.3 Reflection #3: design a sample network using static and dynamic addressing
4.1.2.2: View networks, subnets, and hosts in an IP hierarchy 4.1.3.1, 4.1.3.2: View the subnetting and IP assignments in an addressing scheme
4.1.5.2: Modify IP configurations to enable routing between subnets 4.1.5.3: Create a subnetting scheme 10.0.1, Part B
Ch. 3.5 Reflection 02 #2: create a preliminary network addressing plan for a company LAN
4.1.3.5: Create and apply IPs in order to subnet a network (PT) 9.3.1.4 Troubleshoot a small IP network 9.3.4.5 Troubleshoot DHCP and NAT (PT)
Ch. 5.4 Discussion 03-04: describe NAT with an office model; research NAT using given links
4.2.2.2: Complete a diagram of NAT operations 5.3.8.1: View commands for configuring static NAT
5.3.8.3: Configure static NAT (PT) 5.3.8.4: Use SDM and CLI to configure PAT and NAT
Ch. 6.2 Reflection #1: research TLDs
7.3.3.1: View steps in DNS resolution
1.2.3.4 Interpret ping and traceroute output (PT) 7.3.3.2: Examine cached DNS information 7.3.3.5: Create primary and secondary forward lookup zones
IP Addressing Services VoD
IP Addressing Services VoD
Implement a small routed network
10.0.1, Part E, Step 1
Ch. 5.4 Discussion 03-04: describe NAT with an office model; research NAT using given links
4.2.1.1, 4.2.1.2: View the basic operation of NAT and describe its benefits
4.2.3.3: Observe Network Address Translation (PT)
5.2.4.1: View commands for configuring NAT using SDM
5.2.4.2: Enable NAT on a router using SDM
2.3.1.2: Study host configuration issues 5.3.7.1: View steps for DHCP configuration
5.3.7.2: Configure a Cisco router as a DHCP server (PT) 5.3.7.3: Use Cisco CLI to configure a router as a DHCP server
5.3.7.3: Use SDM and CLI to configure DHCP services
2.3.1.4: Diagnose and correct IP configuration errors (PT)
Ch. 3.5 Discussion 02: Details of the 5-step process of frame transmission
6.1.1.2: View steps in the routing process 6.1.2.4: Build routing table entries
6.1.1.5: Configure static and default routes (PT) 6.1.2.5: Build a network diagram from routing table information 9.4.1.4 Apply routing table principles (PT)
Ch. 3.5 Discussion 04: Compare ARP and routing tables
5.1.1.2: View and describe the functions of ISR components 5.1.3.1: View and describe the stages of the POST process 9.2.2.1: View stages of the bootup process
1.3.1.3 Identify router to meet customer needs 5.1.3.5: Power up and observe router startup procedures
Ch. 5.4 Reflection 02 #2: design a business customer routing solution, describing the device selected and its capabilities
5.1.1.2: View and describe the functions of ISR components 5.1.2.1: Describe cables and connections in physical setup of an ISR
6.1.5.1: View steps in configuring RIP
6.1.5.3: Configure RIP (PT) 6.1.5.4: Configure RIP 9.4.2.4: Troubleshoot a RIP router network 9.4.2.3 RIP challenge (PT)
5.3.1.3: Navigate through router command modes (e-lab)
5.3.2.5: Explore router CLI (PT) 5.3.4.4: Use router CLI to perform basic router configuration 5.3.5.5: Set and verify basic parameters using router CLI
5.3.3.2: View router interface information (e-lab) 9.2.3.1, 3.2: View outputs of various show commands related to interfaces
5.3.5.4: Configure ethernet and serial interfaces (PT) 9.2.3.3: Use show commands to identify interface problems and errors
8.3.2.1: View and compare in-band and out-of-band operations
1.2.3.4 Interpret ping and traceroute output (PT) 5.3.5.5: Set and verify basic parameters using router CLI 8.3.3.2: Use Telnet to establish connectivity 8.3.3.4: Use SSH to configure a remote router
6.1.1.4: View static route configurations
5.3.6.2: Configure a default route (PT) 6.1.1.5: Manually configure static and default routes (PT)
5.3.9.1: View the backup process
5.3.9.3: Back up a configuration using TFTP (PT) 5.3.9.4: Save and load router configuration files
8.4.3.1: View the backup process 8.4.3.3: View ROM monitor recovery process
8.4.3.2: Use TFTP to back up and restore Cisco IOS software images 8.4.3.4: Use ROMmon and tftpdnld to manage Cisco IOS images
5.3.4.1, 4.2, 4.3: View password security configurations
5.3.4.4: Perform an initial router configuration (PT) 5.3.5.5: Set and verify basic parameters using router CLI
Explain and select the appropriate administrative tasks required for a WLAN.
Identify security threats to a network and describe general methods to mitigate those threats.
8.3.2.1: View and compare in-band and out-of-band operations
2.3.1.4 Troubleshoot network issues (PT) 5.3.3.3 Using Cisco IOS CLI show commands (PT) 9.4.2.4: Troubleshoot configurations on remote routers in a RIP network
Ch. 7: Wireless Technologies VoD Ch. 7.1 Reflection #1: research business uses of Bluetooth Ch. 7.2 Reflection #1: research development of the 802.11n standard
Ch. 7.2 Discussion 02: have students diagram the ESS in a "wireless school"; have students track WLAN connectivity by measuring signal strength as they move around the building
Ch. 7.2 Discussion 02: use multiple APs to experiment with configuring SSIDs
10.0.1, Part D, Step 3 9.6.5.5 CCENT troubleshooting challenge
Ch. 7.3 Reflection #6: teams attempt to access each other's wireless AP in an "attack and defend" activity
8.2.4.1: View differences between forms of authentication 8.2.4.2: Compare WEP and WPA
8.2.4.3: Configure WEP on a wireless router. (PT)
Ch. 7.3 Reflection #1: research war driving using links given Ch. 7.4 Reflection #3: identify a large room and have students conduct a survey, detailing issues involved with implementing a WLAN
9.2.1.1: View possible problem areas at Layers 1 and 2 on WLANs
9.6.5.5 CCENT troubleshooting challenge
Implement and verify WAN links.
Serial Connectivity VoD
Ch. 3.4 Discussion 08: Describe how ARP poisoning occurs Ch. 4.3 Reflection 01: track the proliferation ofa virus or worm over the Internet Ch. 6.2 Reflection #2: research phishing
8.1.1.2: Describe a variety of ISP security practices 8.2.1.1: View differences between DoS, DDoS, and DRDoS attacks
8.1.3.3: Take steps to secure local and transmitted data
Ch. 7.3 Reflection #2: research network attacks and methods used against them
8.1.1.2: Describe a variety of ISP security practices 8.2.1.2: Describe ACLs and port filtering
8.2.1.3: Create a plan for port filters and access lists 8.2.2.3: Create a plan for implementing firewalls
Ch. 8.4 Reflection #2: research vulnerability analysis tools
7.4.2.5: Compare HTTP and HTTPS 8.1.3.2: Describe ways to encrypt various network applications 8.2.3.4: Distinguish between IDS and IPS
8.2.1.3: Create a plan for port filters and access lists 8.2.2.3 Plan network-based firewalls (PT)
Ch. 8: Network Security VoD
8.1.1.2: Describe a variety of ISP security practices 8.1.2.2: View the AAA process
8.1.3.3: Take steps to secure local and transmitted data
1.2.1.1: Compare various types of Internet connections 5.4.2.2: View differences between circuit-and packet-switched and point-to-point connections.
5.4.3.3: Complete a WAN upgrade based on a business scenario
5.3.5.3: Configure a serial interface (e-lab) 5.4.4.1: View a serial PPP configuration 9.2.5.2: View and compare serial interface outputs
5.4.4.2: Configure a PPP connection (PT) 9.2.5.3: Troubleshoot encapsulation mismatches on a WAN serial connection (PT) 9.2.5.4: Troubleshoot WAN connectivity on a serial connection
Chapter Content AlignmentCCNA Discovery 2
ICG Extensions
Networking VoD: Introduction to PC Hardware
Ch. 3.1 Reflections 01& 02: Students create a network upgrade design for their school building or classroom, or for a business
Ch. 2 ISP Help Desk VoD Ch. 2.2 Discussion 01 Activities #1 & 2: OSI model and protocols charts Ch. 7.2 Reflections 01& 02: Taboo cards, acronym bingo, and match game reviewing TCP/IP protocol terminology Ch. 7.2 Reflection 03: Match encapsulation steps to protocol layers
Ch. 7.2 Reflections 01& 02: Taboo cards, acronym bingo and match game reviewing TCP/IP protocol terminology
Ch. 1: The Internet and its Uses VoD
Ch. 3: Planning the Network Upgrade VoD Ch. 3.1 Reflections 01 & 02: Students create a network upgrade design for their school building or classroom, or for a business
Ch. 3: Planning the Network Upgrade VoD
Ch. 2.2 Reflections 01 & 02: Hands-on troubleshooting based on OSI layers and requiring completion of "trouble tickets" Ch. 2.3 Reflection #1: Practice SOHO connectivity troubleshooting scenarios
Exploration 1: Data Link Layer VoD
Ch. 5 5 Reflection 01: Explore Cisco resources on autonegotiation problems in switches
Networking VoD: Securing the Local Area Network
Ch. 2.2 Reflections 01 & 02: Hands-on troubleshooting based on OSI layers and requiring completion of "trouble tickets" Ch. 2.3 Reflection #1: Practice SOHO connectivity troubleshooting scenarios Ch. 5 5 Reflection 01: Explore Cisco resources on autonegotiation problems in switches
Ch. 4.1 Discussion 03 Activity 03: Review network classes Ch. 4.1 Reflection: Subnetting practice exercises and activities Ch. 4.1 Discussion 13: Calculate addresses within a CIDR block
Ch. 4 Network Address Translation VoD
Ch. 5.2 Reflection 01: Explore secondary DNS services Ch. 7.3 Reflection 01: Divide an SLD into sub-domains
Ch. 4 Network Address Translation VoD Ch. 4.1 Discussion 05: Complete a T-chart comparing public and private addressing
Ch. 5.2 Reflection 02: Students complete blank screenshots of SDM Express configuration screens
Ch. 2.2 Reflections 01 & 02: Hands-on troubleshooting based on OSI layers and requiring completion of "trouble tickets"
Ch. 5 Accessing the Router VoD Ch. 5.1 Discussion 06: Detailed outline of bootup process Ch. 5.1 Discussion 08: Details on the sho version command and output Ch. 5.1 Discussion 09: Flowchart various boot options
Ch. 2.2 Reflections 01 & 02: Hands-on troubleshooting based on OSI layers and requiring completion of "trouble tickets"
Networking VoD: Teaching RIPv2
Ch. 5.3 Reflection 01, Activity 03: Work with CLI Hot Keys
Ch. 5.1 Discussion 03: Explore the Cisco IOS software resources
Ch. 5.1 Discussion 03: Explore the Cisco IOS software resources
Ch. 7.3 Reflection 02: Research DoS attacks related to DNS
Networking VoD: Securing a Website with HTTPS
Ch. 1.2 Discussion 02: Explore implementations of Metro Ethernet Ch. 1.2 Reflection 01: Research wireless Internet providers Ch. 1.2 Reflection 02: Use online tools to compare ISP services Ch. 1.2 Reflection 03: Explore enterprise connections case studies