- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Switched Networks Course BookletYour Cisco (R) Networking Academy (R) Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical:* The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the "Your Chapter Notes" section.* Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation.* An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to perform the labs, Class Activities, interactive activities, Packet Tracer activities, chapter quizzes, and exams.The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course.Related Titles:Switched Networks Lab ManualBook: 978-1-58713-327-5Switched Networks Companion GuideBook: 978-1-58713-329-9eBook: 978-0-13-347646-0CCNA Routing and Switching Practice and Study Guide Book: 978-1-58713-344-2eBook: 978-0-13-351761-3CCNA Routing and Switching Portable Command Guide Book: 978-1-58720-430-2eBook: 978-0-13-338136-8
Contents
Chapter 0 Introduction to Course 10.0 Switched Networks 10.0.1 Message to the Student 10.0.1.1 Welcome 10.0.1.2 A Global Community 10.0.1.3 More Than Just Information 10.0.1.4 How We Teach 20.0.1.5 Practice Leads to Mastery 20.0.1.6 Mind Wide Open 20.0.1.7 Engineering Journals 20.0.1.8 Explore the World of Networking 20.0.1.9 Create Your Own Worlds 30.0.1.10 How Packet Tracer Helps Master Concepts 30.0.1.11 Course Overview 30.1.1.1 Course GUI Tutorial 4Your Chapter Notes 5Chapter 1 Introduction to Switched Networks 71.0 Introduction 71.0.1.1 Introduction 71.0.1.2 Class Activity - Sent or Received 71.1 LAN Design 81.1.1 Converged Networks 81.1.1.1 Growing Complexity of Networks 81.1.1.2 Elements of a Converged Network 81.1.1.3 Cisco Borderless Network 91.1.1.4 Hierarchy in the Borderless Switched Network 91.1.1.5 Access, Distribution, and Core Layers 101.1.1.6 Activity - Identify Switched Network Terminology 111.1.2 Switched Networks 111.1.2.1 Role of Switched Networks 111.1.2.2 Form Factors 121.1.2.3 Traffic Flow 121.1.2.4 Multilayer Switching 131.1.2.5 Packet Tracer - Comparing 2960 and 3560 Switches 131.1.3 Switch Features 131.1.3.1 Port Density 131.1.3.2 Forwarding Rates 141.1.3.3 Power over Ethernet 141.1.3.4 Cisco Catalyst Switch Breakdown 151.1.3.5 Activity - Identify Switch Hardware 161.1.3.6 Lab - Selecting Switching Hardware 161.2 The Switched Environment 161.2.1 Frame Forwarding 161.2.1.1 Switching as a General Concept in Networking and Telecommunications 161.2.1.2 Dynamically Populating a Switch MAC Address Table 171.2.1.3 Switch Forwarding Methods 181.2.1.4 Store-and-Forward Switching 181.2.1.5 Cut-Through Switching 191.2.1.6 Activity - Frame Forwarding Methods 191.2.1.7 Activity - Switch It! 191.2.2 Switching Domains 201.2.2.1 Collision Domains 201.2.2.2 Broadcast Domains 201.2.2.3 Alleviating Network Congestion 201.2.2.4 Activity - Circle the Domain 211.3 Summary 211.3.1.1 Class Activity - It's Network Access Time 211.3.1.2 Basic Switch Configurations 221.3.1.3 Packet Tracer - Skills Integration Challenge 221.3.1.4 Summary 22Your Chapter Notes 24Chapter 2 Basic Switching Concepts and Configuration 252.0 Basic Switching Concepts and Configuration 252.0.1.1 Introduction 252.0.1.2 Class Activity - Stand By Me 252.1 Basic Switch Configuration 262.1.1 Configure a Switch with Initial Settings 262.1.1.1 Switch Boot Sequence 262.1.1.2 Recovering From a System Crash 262.1.1.3 Switch LED Indicators 272.1.1.4 Preparing for Basic Switch Management 282.1.1.5 Configuring Basic Switch Management Access with IPv4 282.1.1.6 Lab - Configuring Basic Switch Settings 292.1.2 Configure Switch Ports 292.1.2.1 Duplex Communication 292.1.2.2 Configure Switch Ports at the Physical Layer 302.1.2.3 Auto-MDIX 312.1.2.4 Verifying Switch Port Configuration 312.1.2.5 Network Access Layer Issues 322.1.2.6 Troubleshooting Network Access Layer Issues 332.2 Switch Security: Management and Implementation 342.2.1 Secure Remote Access 342.2.1.1 SSH Operation 342.2.1.2 Configuring SSH 342.2.1.3 Verifying SSH 352.2.1.4 Packet Tracer - Configuring SSH 362.2.2 Security Concerns in LANs 362.2.2.1 Common Security Attacks: MAC Address Flooding 362.2.2.2 Common Security Attacks: DHCP Spoofing 372.2.2.3 Common Security Attacks: Leveraging CDP 382.2.2.4 Activity - Identify Common Security Attacks 392.2.3 Security Best Practices 392.2.3.1 Best Practices 392.2.3.2 Network Security Tools and Testing 392.2.3.3 Network Security Audits 402.2.4 Switch Port Security 402.2.4.1 Secure Unused Ports 402.2.4.2 DHCP Snooping 412.2.4.3 Port Security: Operation 412.2.4.4 Port Security: Violation Modes 432.2.4.5 Port Security: Configuring 432.2.4.6 Port Security: Verifying 432.2.4.7 Ports in Error Disabled State 442.2.4.8 Network Time Protocol (NTP) 442.2.4.9 Packet Tracer - Configuring Switch Port Security 452.2.4.10 Packet Tracer - Troubleshooting Switch Port Security 452.2.4.11 Lab - Configuring Switch Security Features 462.3 Summary 462.3.1.1 Class Activity - Switch Trio 462.3.1.2 Packet Tracer - Skills Integration Challenge 462.3.1.3 Summary 47Your Chapter Notes 49Chapter 3 VLANs 513.0 VLANs 513.0.1.1 Introduction 513.0.1.2 Class Activity - Vacation Station 513.1 VLAN Segmentation 523.1.1 Overview of VLANs 523.1.1.1 VLAN Definitions 523.1.1.2 Benefits of VLANs 523.1.1.3 Types of VLANs 533.1.1.4 Voice VLANs 543.1.1.5 Packet Tracer - Who Hears the Broadcast? 543.1.2 VLANs in a Multi-Switched Environment 553.1.2.1 VLAN Trunks 553.1.2.2 Controlling Broadcast Domains with VLANs 553.1.2.3 Tagging Ethernet Frames for VLAN Identification 563.1.2.4 Native VLANs and 802.1Q Tagging 563.1.2.5 Voice VLAN Tagging 573.1.2.6 Activity - Predict Switch Behavior 583.1.2.7 Packet Tracer - Investigating a VLAN Implementation 583.2 VLAN Implementations 583.2.1 VLAN Assignment 583.2.1.1 VLAN Ranges on Catalyst Switches 583.2.1.2 Creating a VLAN 593.2.1.3 Assigning Ports to VLANs 593.2.1.4 Changing VLAN Port Membership 603.2.1.5 Deleting VLANs 603.2.1.6 Verifying VLAN Information 613.2.1.7 Packet Tracer - Configuring VLANs 613.2.2 VLAN Trunks 613.2.2.1 Configuring IEEE 802.1Q Trunk Links 613.2.2.2 Resetting the Trunk to Default State 623.2.2.3 Verifying Trunk Configuration 623.2.2.4 Packet Tracer - Configuring Trunks 623.2.2.5 Lab - Configuring VLANs and Trunking 623.2.3 Dynamic Trunking Protocol 633.2.3.1 Introduction to DTP 633.2.3.2 Negotiated Interface Modes 633.2.3.3 Activity - Predict DTP Behavior 643.2.4 Troubleshoot VLANs and Trunks 643.2.4.1 IP Addressing Issues with VLAN 643.2.4.2 Missing VLANs 653.2.4.3 Introduction to Troubleshooting Trunks 653.2.4.4 Common Problems with Trunks 663.2.4.5 Trunk Mode Mismatches 663.2.4.6 Incorrect VLAN List 673.2.4.7 Packet Tracer - Troubleshooting a VLAN Implementation - Scenario 1 673.2.4.8 Packet Tracer - Troubleshooting a VLAN Implementation - Scenario 2 673.2.4.9 Lab - Troubleshooting VLAN Configurations 673.3 VLAN Security and Design 683.3.1 Attacks on VLANs 683.3.1.1 Switch Spoofing Attack 683.3.1.2 Double-Tagging Attack 683.3.1.3 PVLAN Edge 693.3.1.4 Activity - Identify the Type of VLAN Attacks 693.3.2 VLAN Best Practices 693.3.2.1 VLAN Design Guidelines 693.3.2.2 Lab - Implementing VLAN Security 703.4 Summary 703.4.1.1 Class Activity - VLAN Plan 703.4.1.2 Packet Tracer - Skills Integration Challenge 713.4.1.3 Summary 71Your Chapter Notes 73Chapter 4 LAN Redundancy 754.0 LAN Redundancy 754.0.1.1 Introduction 754.0.1.2 Class Activity - Stormy Traffic 754.1 Spanning Tree Concepts 764.1.1 Purpose of Spanning Tree 764.1.1.1 Redundancy at OSI Layers 1 and 2 764.1.1.2 Issues with Layer 1 Redundancy: MAC Database Instability 774.1.1.3 Issues with Layer 1 Redundancy: Broadcast Storms 784.1.1.4 Issues with Layer 1 Redundancy: Duplicate Unicast Frames 784.1.1.5 Packet Tracer - Examining a Redundant Design 794.1.2 STP Operation 794.1.2.1 Spanning Tree Algorithm: Introduction 794.1.2.2 Spanning Tree Algorithm: Port Roles 814.1.2.3 Spanning Tree Algorithm: Root Bridge 824.1.2.4 Spanning Tree Algorithm: Path Cost 824.1.2.5 802.1D BPDU Frame Format 834.1.2.6 BPDU Propagation and Process 844.1.2.7 Extended System ID 854.1.2.8 Activity - Identify 802.1D Port Roles 864.1.2.9 Video Demonstration - Observing Spanning Tree Protocol Operation 864.1.2.10 Lab - Building a Switched Network with Redundant Links 864.2 Varieties of Spanning Tree Protocols 864.2.1 Overview 864.2.1.1 List of Spanning Tree Protocols 864.2.1.2 Characteristics of the Spanning Tree Protocols 874.2.1.3 Activity - Identify Types of Spanning Tree Protocols 884.2.2 PVST+ 884.2.2.1 Overview of PVST+ 884.2.2.2 Port States and PVST+ Operation 894.2.2.3 Extended System ID and PVST+ Operation 904.2.2.4 Activity - Identifying PVST+ Operation 904.2.3 Rapid PVST+ 914.2.3.1 Overview of Rapid PVST+ 914.2.3.2 RSTP BPDU 914.2.3.3 Edge Ports 924.2.3.4 Link Types 924.2.3.5 Activity - Identify Port Roles in Rapid PVST+ 934.2.3.6 Activity - Compare PVST+ and Rapid PVST+ 934.3 Spanning Tree Configuration 934.3.1 PVST+ Configuration 934.3.1.1 Catalyst 2960 Default Configuration 934.3.1.2 Configuring and Verifying the Bridge ID 934.3.1.3 PortFast and BPDU Guard 944.3.1.4 PVST+ Load Balancing 954.3.1.5 Packet Tracer - Configuring PVST+ 964.3.2 Rapid PVST+ Configuration 964.3.2.1 Spanning Tree Mode 964.3.2.2 Packet Tracer - Configuring Rapid PVST+ 974.3.2.3 Lab - Configuring Rapid PVST+, PortFast and BPDU Guard 974.3.3 STP Configuration Issues 974.3.3.1 Analyzing the STP Topology 974.3.3.2 Expected Topology versus Actual Topology 984.3.3.3 Overview of Spanning Tree Status 984.3.3.4 Spanning Tree Failure Consequences 984.3.3.5 Repairing a Spanning Tree Problem 994.3.3.6 Activity - Troubleshoot STP Configuration Issues 994.4 First Hop Redundancy Protocols 1004.4.1 Concept of First Hop Redundancy Protocols 1004.4.1.1 Default Gateway Limitations 1004.4.1.2 Router Redundancy 1004.4.1.3 Steps for Router Failover 1014.4.1.4 Activity - Identify FHRP Terminology 1014.4.2 Varieties of First Hop Redundancy Protocols 1014.4.2.1 First Hop Redundancy Protocols 1014.4.2.2 Activity - Identify the Type of FHRP 1024.4.3 FHRP Verification 1024.4.3.1 HSRP Verification 1024.4.3.2 GLBP Verification 1034.4.3.3 Syntax Checker - HSRP and GLBP 1034.4.3.4 Lab - Configuring HSRP and GLBP 1034.5 Summary 1044.5.1.1 Class Activity - Documentation Tree 1044.5.1.2 Summary 104Your Chapter Notes 105Chapter 5 Link Aggregation 1075.0 Introduction 1075.0.1.1 Introduction 1075.0.1.2 Class Activity - Imagine This 1075.1 Link Aggregation Concepts 1085.1.1 Link Aggregation 1085.1.1.1 Introduction to Link Aggregation 1085.1.1.2 Advantages of EtherChannel 1085.1.2 EtherChannel Operation 1095.1.2.1 Implementation Restrictions 1095.1.2.2 Port Aggregation Protocol 1105.1.2.3 Link Aggregation Control Protocol 1115.1.2.4 Activity - Identify the PAgP and LACP Modes 1115.2 Link Aggregation Configuration 1115.2.1 Configuring EtherChannel 1115.2.1.1 Configuration Guidelines 1115.2.1.2 Configuring Interfaces 1125.2.1.3 Packet Tracer - Configuring EtherChannel 1125.2.1.4 Lab - Configuring EtherChannel 1135.2.2 Verifying and Troubleshooting EtherChannel 1135.2.2.1 Verifying EtherChannel 1135.2.2.2 Troubleshooting EtherChannel 1135.2.2.3 Packet Tracer - Troubleshooting EtherChannel 1145.2.2.4 Lab - Troubleshooting EtherChannel 1145.3 Summary 1155.3.1.1 Class Activity - Linking Up 1155.3.1.2 Packet Tracer - Skills Integration Challenge 1155.3.1.3 Summary 115Your Chapter Notes 116Chapter 6 Inter-VLAN Routing 1176.0 Inter-VLAN Routing 1176.0.1.1 Introduction 1176.0.1.2 Class Activity - Switching to Local-Network Channels 1176.1 Inter-VLAN Routing Configuration 1186.1.1 Inter-VLAN Routing Operation 1186.1.1.1 What is Inter-VLAN Routing? 1186.1.1.2 Legacy Inter-VLAN Routing 1186.1.1.3 Router-on-a-Stick Inter-VLAN Routing 1196.1.1.4 Multilayer Switch Inter-VLAN Routing 1206.1.1.5 Activity - Identify the Types of Inter-VLAN Routing 1216.1.2 Configure Legacy Inter-VLAN Routing 1216.1.2.1 Configure Legacy Inter-VLAN Routing: Preparation 1216.1.2.2 Configure Legacy Inter-VLAN Routing: Switch Configuration 1226.1.2.3 Configure Legacy Inter-VLAN Routing: Router Interface Configuration 1226.1.2.4 Lab - Configuring Per-Interface Inter-VLAN Routing 1236.1.3 Configure Router-on-a-Stick Inter-VLAN Routing 1236.1.3.1 Configure Router-on-a-Stick: Preparation 1236.1.3.2 Configure Router-on-a-Stick: Switch Configuration 1246.1.3.3 Configure Router-on-a-Stick: Router Subinterface Configuration 1246.1.3.4 Configure Router-on-a-Stick: Verifying Subinterfaces 1256.1.3.5 Configure Router-on-a-Stick: Verifying Routing 1256.1.3.6 Packet Tracer - Configuring Router-on-a-Stick Inter-VLAN Routing 1266.1.3.7 Lab - Configuring 801.2Q Trunk-Based Inter-VLAN Routing 1266.2 Troubleshoot Inter-VLAN Routing 1276.2.1 Inter-VLAN Configuration Issues 1276.2.1.1 Switch Port Issues 1276.2.1.2 Verify Switch Configuration 1276.2.1.3 Interface Issues 1286.2.1.4 Verify Router Configuration 1286.2.2 IP Addressing Issues 1296.2.2.1 Errors with IP Addresses and Subnet Masks 1296.2.2.2 Verifying IP Address and Subnet Mask Configuration Issues 1296.2.2.3 Activity - Identify the Troubleshooting Command for an Inter-VLAN Routing Issue 1306.2.2.4 Packet Tracer - Troubleshooting Inter-VLAN Routing 1306.3 Layer 3 Switching 1306.3.1 Layer 3 Switching Operation and Configuration 1306.3.1.1 Introduction to Layer 3 Switching 1306.3.1.2 Inter-VLAN Routing with Switch Virtual Interfaces 1306.3.1.3 Inter-VLAN Routing with Switch Virtual Interfaces (Cont.) 1316.3.1.4 Inter-VLAN Routing with Routed Ports 1326.3.1.5 Configuring Static Routes on a Catalyst 2960 1326.3.2 Troubleshoot Layer 3 Switching 1336.3.2.1 Layer 3 Switch Configuration Issues 1336.3.2.2 Example: Troubleshooting Layer 3 Switching 1346.3.2.3 Activity - Troubleshoot Layer 3 Switching Issues 1356.3.2.4 Lab - Troubleshooting Inter-VLAN Routing 1356.4 Summary 1356.4.1.1 Class Activity - The Inside Track 1356.4.1.2 Packet Tracer - Skills Integration Challenge 1366.4.1.3 Summary 136Your Chapter Notes 137Chapter 7 DHCP 1397.0 Introduction 1397.0.1.1 Introduction 1397.0.1.2 Class Activity - Own or Lease? 1397.1 Dynamic Host Configuration Protocol v4 1407.1.1 DHCPv4 Operation 1407.1.1.1 Introducing DHCPv4 1407.1.1.2 DHCPv4 Operation 1417.1.1.3 DHCPv4 Message Format 1427.1.1.4 DHCPv4 Discover and Offer Messages 1437.1.1.5 Activity - Identify the Steps in DHCPv4 Operation 1447.1.2 Configuring a Basic DHCPv4 Server 1447.1.2.1 Configuring a Basic DHCPv4 Server 1447.1.2.2 Verifying DHCPv4 1457.1.2.3 DHCPv4 Relay 1457.1.2.4 Lab - Configuring Basic DHCPv4 on a Router 1467.1.2.5 Lab - Configuring Basic DHCPv4 on a Switch 1477.1.3 Configure DHCPv4 Client 1477.1.3.1 Configuring a Router as DHCPv4 Client 1477.1.3.2 Configuring a SOHO Router as a DHCPv4 Client 1477.1.3.3 Packet Tracer - Configuring DHCPv4 Using Cisco IOS 1487.1.4 Troubleshoot DHCPv4 1487.1.4.1 Troubleshooting Tasks 1487.1.4.2 Verify Router DHCPv4 Configuration 1497.1.4.3 Debugging DHCPv4 1497.1.4.4 Lab - Troubleshooting DHCPv4 1507.2 Dynamic Host Configuration Protocol v6 1507.2.1 SLAAC and DHCPv6 1507.2.1.1 Stateless Address Autoconfiguration (SLAAC) 1507.2.1.2 SLAAC Operation 1517.2.1.3 SLAAC and DHCPv6 1527.2.1.4 SLAAC Option 1527.2.1.5 Stateless DHCPv6 Option 1527.2.1.6 Stateful DHCPv6 Option 1537.2.1.7 DHCPv6 Operations 1537.2.1.8 Activity - Identify the Steps in DHCPv6 Operation 1547.2.2 Stateless DHCPv6 1547.2.2.1 Configuring a Router as a Stateless DHCPv6 Server 1547.2.2.2 Configuring a Router as a Stateless DHCPv6 Client 1557.2.2.3 Verifying Stateless DHCPv6 1557.2.3 Stateful DHCPv6 Server 1567.2.3.1 Configuring a Router as a Stateful DHCPv6 Server 1567.2.3.2 Configuring a Router as a Stateful DHCPv6 Client 1577.2.3.3 Verifying Stateful DHCPv6 1577.2.3.4 Configuring a Router as a DHCPv6 Relay Agent 1577.2.3.5 Lab - Configuring Stateless and Stateful DHCPv6 1587.2.4 Troubleshoot DHCPv6 1587.2.4.1 Troubleshooting Tasks 1587.2.4.2 Verify Router DHCPv6 Configuration 1597.2.4.3 Debugging DHCPv6 1597.2.4.4 Lab - Troubleshooting DHCPv6 1607.3 Summary 1607.3.1.1 Class Activity - IoE and DHCP 1607.3.1.2 Packet Tracer Skills Integration Challenge 1607.3.1.3 Summary 160Your Chapter Notes 162Chapter 8 Wireless LANs 1638.0 Introduction 1638.0.1.1 Introduction 1638.0.1.2 Class Activity - Make Mine Wireless 1638.1 Wireless Concepts 1638.1.1 Introduction to Wireless 1638.1.1.1 Supporting Mobility 1638.1.1.2 Benefits of Wireless 1648.1.1.3 Wireless Technologies 1658.1.1.4 Radio Frequencies 1658.1.1.5 802.11 Standards 1668.1.1.6 Wi-Fi Certification 1678.1.1.7 Comparing WLANs to a LAN 1688.1.1.8 Activity - Identify the Wireless Technology 1698.1.1.9 Activity - Compare Wireless Standards 1698.1.1.10 Activity - Compare WLANs and LANs 1698.1.2 Components of WLANs 1698.1.2.1 Wireless NICs 1698.1.2.2 Wireless Home Router 1698.1.2.3 Business Wireless Solutions 1708.1.2.4 Wireless Access Points 1708.1.2.5 Small Wireless Deployment Solutions 1718.1.2.6 Large Wireless Deployment Solutions 1728.1.2.7 Large Wireless Deployment Solutions, Cont. 1738.1.2.8 Wireless Antennas 1738.1.2.9 Activity - Identify WLAN Component Terminology 1748.1.2.10 Lab - Investigating Wireless Implementations 1748.1.3 802.11 WLAN Topologies 1748.1.3.1 802.11 Wireless Topology Modes 1748.1.3.2 Ad Hoc Mode 1758.1.3.3 Infrastructure Mode 1758.1.3.4 Activity - Identify WLAN Topology Terminology 1768.2 Wireless LAN Operations 1768.2.1 802.11 Frame Structure 1768.2.1.1 Wireless 802.11 Frame 1768.2.1.2 Frame Control Field 1778.2.1.3 Wireless Frame Type 1788.2.1.4 Management Frames 1788.2.1.5 Control Frames 1798.2.1.6 Activity - Identify the 802.11 Frame Control Fields 1798.2.2 Wireless Operation 1798.2.2.1 Carrier Sense Multiple Access with Collision Avoidance 1798.2.2.2 Wireless Clients and Access Point Association 1808.2.2.3 Association Parameters 1808.2.2.4 Discovering APs 1818.2.2.5 Authentication 1828.2.2.6 Activity - Order the Steps in the Client and AP Association Process 1838.2.3 Channel Management 1838.2.3.1 Frequency Channel Saturation 1838.2.3.2 Selecting Channels 1848.2.3.3 Planning a WLAN Deployment 1848.2.3.4 Activity - Identify Channel Management Terminology 1858.2.3.5 Activity - Cisco Wireless Explorer Game 1858.3 Wireless LAN Security 1858.3.1 WLAN Threats 1858.3.1.1 Securing Wireless 1858.3.1.2 DoS Attack 1868.3.1.3 Management Frame DoS Attacks 1878.3.1.4 Rogue Access Points 1878.3.1.5 Man-in-the-Middle Attack 1888.3.2 Securing WLANs 1898.3.2.1 Wireless Security Overview 1898.3.2.2 Shared Key Authentication Methods 1898.3.2.3 Encryption Methods 1908.3.2.4 Authenticating a Home User 1918.3.2.5 Authentication in the Enterprise 1918.3.2.6 Activity - Identify the WLAN Authentication Characteristics 1928.4 Wireless LAN Configuration 1928.4.1 Configure a Wireless Router 1928.4.1.1 Configuring a Wireless Router 1928.4.1.2 Setting Up and Installed Initial Linksys EAS6500 1938.4.1.3 Configuring the Linksys Smart Wi-Fi Homepage 1938.4.1.4 Smart Wi-Fi Settings 1948.4.1.5 Smart Wi-Fi Tools 1948.4.1.6 Backing Up a Configuration 1958.4.2 Configuring Wireless Clients 1958.4.2.1 Connecting Wireless Clients 1958.4.2.2 Packet Tracer - Configuring Wireless LAN Access 1958.4.2.3 Lab - Configuring a Wireless Router and Client 1968.4.3 Troubleshoot WLAN Issues 1968.4.3.1 Troubleshooting Approaches 1968.4.3.2 Wireless Client Not Connecting 1968.4.3.3 Troubleshooting When the Network Is Slow 1978.4.3.4 Updating Firmware 1988.4.3.5 Activity - Identify the Troubleshooting Solution 1988.5 Summary 1988.5.1.1 Class Activity - Inside and Outside Control 1988.5.1.2 Packet Tracer - Skills Integration Challenge 1998.5.1.3 Summary 199Your Chapter Notes 201