Routing and Switching Essentials Course Booklet
Home > Computing and Information Technology > Computer certification > Computer certification: Cisco > Routing and Switching Essentials Course Booklet
Routing and Switching Essentials Course Booklet

Routing and Switching Essentials Course Booklet

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

Routing and Switching Essentials Course Booklet Your Cisco® Networking Academy® Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical:   • The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the “Your Chapter Notes” section. • Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation. • An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to perform the labs, Class Activities, interactive activities, Packet Tracer activities, chapter quizzes, and exams.   The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course.   Related titles: Routing and Switching Essentials Companion Guide book: 978-1-58713-318-3 eBook: 978-0-13-347622-4   Routing and Switching Essentials Lab Manual book: 978-1-58713-320-6   CCENT Practice and Study Guide book: 978-1-58713-345-9 eBook: 978-0-13-351765-1   CCNA Routing and Switching Portable Command Guide book: 978-1-58720-430-2 eBook: 978-0-13-338136-8  

Table of Contents:
Chapter 0 Course Introduction 1 0.0 Welcome to Routing and Switching Essentials 1 0.0.1 Message to the Student 1  0.0.1.1 Welcome 1  0.0.1.2 A Global Community 1  0.0.1.3 More Than Just Information 1  0.0.1.4 How We Teach 2  0.0.1.5 Practice Leads to Mastery 2  0.0.1.6 Mind Wide Open 2  0.0.1.7 Engineering Journals 2  0.0.1.8 Explore the World of Networking 2  0.0.1.9 Create Your Own Worlds 3  0.0.1.10 How Packet Tracer Helps Master Concepts 3  0.0.1.11 Course Overview 3  0.1.1.1 Course GUI Tutorial 4 Your Chapter Notes 5   Chapter 1 Introduction to Switched Networks 7 1.0 Introduction 7 1.0.1.1 Introduction 7  1.0.1.2 Class Activity Sent or Received Instructions 7 1.1 LAN Design 8 1.1.1 Converged Networks 8  1.1.1.1 Growing Complexity of Networks 8  1.1.1.2 Elements of a Converged Network 8  1.1.1.3 Borderless Switched Networks 9  1.1.1.4 Hierarchy in the Borderless Switched Network 9  1.1.1.5 Core Distribution Access 10  1.1.1.6 Activity - Identify Switched Network Terminology 11 1.1.2 Switched Networks 11  1.1.2.1 Role of Switched Networks 11  1.1.2.2 Form Factors 11  1.1.2.3 Activity - Identify Switch Hardware 12 1.2 The Switched Environment 12 1.2.1 Frame Forwarding 12  1.2.1.1 Switching as a General Concept in Networking and Telecommunications 12  1.2.1.2 Dynamically Populating a Switch MAC Address Table 13  1.2.1.3 Switch Forwarding Methods 14  1.2.1.4 Store-and-Forward Switching 14  1.2.1.5 Cut-Through Switching 15  1.2.1.6 Activity - Frame Forwarding Methods 15  1.2.1.7 Activity - Switch It! 15 1.2.2 Switching Domains 15  1.2.2.1 Collision Domains 15  1.2.2.2 Broadcast Domains 16  1.2.2.3 Alleviating Network Congestion 16  1.2.2.4 Activity - Circle the Domain 17 1.3 Summary 17 1.3.1.1 Class Activity It’s Network Access Time 17  1.3.1.2 Activity Basic Switch Configurations 18  1.3.1.3 Packet Tracer – Skills Integration Challenge 18  1.3.1.4 Summary 18 Your Chapter Notes 19   Chapter 2 Basic Switching Concepts and Configuration 21 2.0 Basic Switching Concepts and Configuration 21 2.0.1.1 Introduction 21  2.0.1.2 Class Activity – Stand By Me 21 2.1 Basic Switch Configuration 22 2.1.1 Configure a Switch with Initial Settings 22  2.1.1.1 Switch Boot Sequence 22  2.1.1.2 Recovering From a System Crash 23  2.1.1.3 Switch LED Indicators 23  2.1.1.4 Preparing for Basic Switch Management 24  2.1.1.5 Configuring Basic Switch Management Access with IPv4 24  2.1.1.6 Lab - Basic Switch Configuration 25 2.1.2 Configure Switch Ports 25  2.1.2.1 Duplex Communication 25  2.1.2.2 Configure Switch Ports at the Physical Layer 26  2.1.2.3 Auto-MDIX 26  2.1.2.4 Verifying Switch Port Configuration 27  2.1.2.5 Network Access Layer Issues 27  2.1.2.6 Troubleshooting Network Access Layer Issues 29 2.2 Switch Security: Management and Implementation 30 2.2.1 Secure Remote Access 30  2.2.1.1 SSH Operation 30  2.2.1.2 Configuring SSH 30  2.2.1.3 Verifying SSH 31  2.2.1.4 Packet Tracer - Configuring SSH 31 2.2.2 Security Concerns in LANs 32  2.2.2.1 Common Security Attacks: MAC Address Flooding 32  2.2.2.2 Common Security Attacks: DHCP Spoofing 33  2.2.2.3 Common Security Attacks: Leveraging CDP 33  2.2.2.4 Activity - Identify Common Security Attacks 34 2.2.3 Security Best Practices 34  2.2.3.1 Best Practices 34  2.2.3.2 Network Security Tools and Testing 35  2.2.3.3 Network Security Audits 35 2.2.4 Switch Port Security 36  2.2.4.1 Secure Unused Ports 36  2.2.4.2 DHCP Snooping 36  2.2.4.3 Port Security: Operation 37  2.2.4.4 Port Security: Violation Modes 38  2.2.4.5 Port Security: Configuring 39  2.2.4.6 Port Security: Verifying 39  2.2.4.7 Ports in Error Disabled State 40  2.2.4.8 Network Time Protocol (NTP) 40  2.2.4.9 Packet Tracer - Configuring Switch Port Security 41  2.2.4.10 Packet Tracer - Troubleshooting Switch Port Security 41  2.2.4.11 Lab - Configuring Switch Security Features 41 2.3 Summary 41 2.3.1.1 Class Activity – Switch Trio 41  2.3.1.2 Packet Tracer - Skills Integration Challenge 42  2.3.1.3 Summary 42 Your Chapter Notes 44   Chapter 3 VLANs 45 3.0 VLANs 45 3.0.1.1 Introduction 45  3.0.1.2 Class Activity Vacation Station 45 3.1 VLAN Segmentation 46 3.1.1 Overview of VLANs 46  3.1.1.1 VLAN Definitions 46  3.1.1.2 Benefits of VLANs 46  3.1.1.3 Types of VLANs 47  3.1.1.4 Voice VLANs 48  3.1.1.5 Packet Tracer - Who Hears the Broadcast? 48 3.1.2 VLANs in a Multi-Switched Environment 48  3.1.2.1 VLAN Trunks 48  3.1.2.2 Controlling Broadcast Domains with VLANs 49  3.1.2.3 Tagging Ethernet Frames for VLAN Identification 49  3.1.2.4 Native VLANs and 802.1Q Tagging 50  3.1.2.5 Voice VLAN Tagging 51  3.1.2.6 Activity - Predict Switch Behavior 51  3.1.2.7 Packet Tracer - Investigating a VLAN Implementation 51 3.2 VLAN Implementations 51 3.2.1 VLAN Assignment 51  3.2.1.1 VLAN Ranges on Catalyst Switches 51  3.2.1.2 Creating a VLAN 52  3.2.1.3 Assigning Ports to VLANs 53  3.2.1.4 Changing VLAN Port Membership 53  3.2.1.5 Deleting VLANs 54  3.2.1.6 Verifying VLAN Information 54  3.2.1.7 Packet Tracer - Configuring VLANs 55 3.2.2 VLAN Trunks 55  3.2.2.1 Configuring IEEE 802.1Q Trunk Links 55  3.2.2.2 Resetting the Trunk to Default State 56  3.2.2.3 Verifying Trunk Configuration 56  3.2.2.4 Packet Tracer - Configuring Trunks 56  3.2.2.5 Lab - Configuring VLANs and Trunking 56 3.2.3 Dynamic Trunking Protocol 57  3.2.3.1 Introduction to DTP 57  3.2.3.2 Negotiated Interface Modes 57  3.2.3.3 Activity - Predict DTP Behavior 58 3.2.4 Troubleshoot VLANs and Trunks 58  3.2.4.1 IP Addressing Issues with VLAN 58  3.2.4.2 Missing VLANs 58  3.2.4.3 Introduction to Troubleshooting Trunks 59  3.2.4.4 Common Problems with Trunks 60  3.2.4.5 Trunk Mode Mismatches 60  3.2.4.6 Incorrect VLAN List 61  3.2.4.7 Packet Tracer - Troubleshooting a VLAN Implementation - Scenario 1 61  3.2.4.8 Packet Tracer - Troubleshooting a VLAN Implementation - Scenario 2 61  3.2.4.9 Lab - Troubleshooting VLAN Configurations 61 3.3 VLAN Security and Design 62 3.3.1 Attacks on VLANs 62  3.3.1.1 Switch Spoofing Attack 62  3.3.1.2 Double-Tagging Attack 62  3.3.1.3 PVLAN Edge 63  3.3.1.4 Activity - Identify the Type of VLAN Attacks 63 3.3.2 Design Best Practices for VLANs 63  3.3.2.1 VLAN Design Guidelines 63  3.3.2.2 Lab - Implementing VLAN Security 64 3.4 Summary 64 3.4.1.1 Class Activity VLAN Plan 64  3.4.1.2 Packet Tracer - Skills Integration Challenge 65  3.4.1.3 Summary 65 Your Chapter Notes 67   Chapter 4 Routing Concepts 69 4.0 Routing Concepts 69 4.0.1.1 Introduction 69  4.0.1.2 Class Activity - Do We Really Need a Map? 69 4.1 Initial Configuration of a Router 70 4.1.1 Functions of a Router 70  4.1.1.1 Characteristics of a Network 70  4.1.1.2 Why Routing? 71  4.1.1.3 Routers Are Computers 71  4.1.1.4 Routers Interconnect Networks 72  4.1.1.5 Routers Choose Best Paths 73  4.1.1.6 Packet Forwarding Mechanisms 73  4.1.1.7 Activity - Identify Router Components 74  4.1.1.8 Packet Tracer - Using Traceroute to Discover the Network 74  4.1.1.9 Lab - Mapping the Internet 75 4.1.2 Connect Devices 75  4.1.2.1 Connect to a Network 75  4.1.2.2 Default Gateways 76  4.1.2.3 Document Network Addressing 76  4.1.2.4 Enable IP on a Host 77  4.1.2.5 Device LEDs 77  4.1.2.6 Console Access 78  4.1.2.7 Enable IP on a Switch 78  4.1.2.8 Activity - Document an Addressing Scheme 78  4.1.2.9 Packet Tracer - Documenting the Network 78 4.1.3 Basic Settings on a Router 79  4.1.3.1 Configure Basic Router Settings 79  4.1.3.2 Configure an IPv4 Router Interface 79  4.1.3.3 Configure an IPv6 Router Interface 80  4.1.3.4 Configure an IPv4 Loopback Interface 81  4.1.3.5 Packet Tracer - Configuring IPv4 and IPv6 Interfaces 82 4.1.4 Verify Connectivity of Directly Connected Networks 82  4.1.4.1 Verify Interface Settings 82  4.1.4.2 Verify IPv6 Interface Settings 83  4.1.4.3 Filter Show Command Output 83  4.1.4.4 Command History Feature 84  4.1.4.5 Packet Tracer - Configuring and Verifying a Small Network 84  4.1.4.6 Lab - Configuring Basic Router Settings with IOS CLI 84  4.1.4.7 Lab - Configuring Basic Router Settings with CCP 85 4.2 Routing Decisions 85 4.2.1 Switching Packets Between Networks 85  4.2.1.1 Router Switching Function 85  4.2.1.2 Send a Packet 86  4.2.1.3 Forward to the Next Hop 86  4.2.1.4 Packet Routing 87  4.2.1.5 Reach the Destination 87  4.2.1.6 Activity - Match Layer 2 and Layer 3 Addressing 88 4.2.2 Path Determination 88  4.2.2.1 Routing Decisions 88  4.2.2.2 Best Path 89  4.2.2.3 Load Balancing 89  4.2.2.4 Administrative Distance 90  4.2.2.5 Activity - Order the Steps in the Packet Forwarding Process 90 4.3 Router Operation 90 4.3.1 Analyze the Routing Table 90  4.3.1.1 The Routing Table 90  4.3.1.2 Routing Table Sources 91  4.3.1.3 Remote Network Routing Entries 91  4.3.1.4 Activity - Interpret the Content of a Routing Table Entry 92 4.3.2 Directly Connected Routes 92  4.3.2.1 Directly Connected Interfaces 92  4.3.2.2 Directly Connected Routing table Entries 92  4.3.2.3 Directly Connected Examples 93  4.3.2.4 Directly Connected IPv6 Example 93  4.3.2.5 Packet Tracer - Investigating Directly Connected Routes 93 4.3.3 Statically Learned Routes 94  4.3.3.1 Static Routes 94  4.3.3.2 Static Route Examples 94  4.3.3.3 Static IPv6 Route Examples 95 4.3.4 Dynamic Routing Protocols 95  4.3.4.1 Dynamic Routing 95  4.3.4.2 IPv4 Routing Protocols 96  4.3.4.3 IPv4 Dynamic Routing Examples 96  4.3.4.4 IPv6 Routing Protocols 96  4.3.4.5 IPv6 Dynamic Routing Examples 97  4.4 Summary 97 4.4.1.1 Class Activity - We Really Could Use a Map! 97  4.4.1.2 Summary 97 Your Chapter Notes 99   Chapter 5 Inter-VLAN Routing 101 5.0 Inter-VLAN Routing 101 5.0.1.1 Introduction 101  5.0.1.2 Class Activity Switching to Local-Network Channels 101 5.1 Inter-VLAN Routing Configuration 102 5.1.1 Inter-VLAN Routing Operation 102  5.1.1.1 What is Inter-VLAN Routing? 102  5.1.1.2 Legacy Inter-VLAN Routing 102  5.1.1.3 Router-on-a-Stick Inter-VLAN Routing 103  5.1.1.4 Multilayer Switch Inter-VLAN Routing 104  5.1.1.5 Activity - Identify the Types of Inter-VLAN Routing 105 5.1.2 Configure Legacy Inter-VLAN Routing 105  5.1.2.1 Configure Legacy Inter-VLAN Routing: Preparation 105  5.1.2.2 Configure Legacy Inter-VLAN Routing: Switch Configuration 106  5.1.2.3 Configure Legacy Inter-VLAN Routing: Router Interface Configuration 106  5.1.2.4 Lab - Configuring Per-Interface Inter-VLAN Routing 107 5.1.3 Configure Router-on-a-Stick Inter-VLAN Routing 107  5.1.3.1 Configure Router-on-a-Stick: Preparation 107  5.1.3.2 Configure Router-on-a-Stick: Switch Configuration 108  5.1.3.3 Configure Router-on-a-Stick: Router Subinterface Configuration 108  5.1.3.4 Configure Router-on-a-Stick: Verifying Subinterfaces 109  5.1.3.5 Configure Router-on-a-Stick: Verifying Routing 110  5.1.3.6 Packet Tracer - Configuring Router-on-a-Stick Inter-VLAN Routing 110  5.1.3.7 Lab - Configuring 801.2Q Trunk-Based Inter-VLAN Routing 111 5.2 Troubleshoot Inter-VLAN Routing 111 5.2.1 Inter-VLAN Configuration Issues 111  5.2.1.1 Switch Port Issues 111  5.2.1.2 Verify Switch Configuration 112  5.2.1.3 Interface Issues 112  5.2.1.4 Verify Router Configuration 112 5.2.2 IP Addressing Issues 113  5.2.2.1 Errors with IP Addresses and Subnet Masks 113  5.2.2.2 Verifying IP Address and Subnet Mask Configuration Issues 113  5.2.2.3 Activity - Identify the Solution to the Inter-VLAN Routing Issue 114  5.2.2.4 Packet Tracer - Troubleshooting Inter-VLAN Routing 114 5.3 Layer 3 Switching 114 5.3.1 Layer 3 Switching Operation and Configuration 114  5.3.1.1 Introduction to Layer 3 Switching 114  5.3.1.2 Inter-VLAN Routing with Switch Virtual Interfaces 115  5.3.1.3 Inter-VLAN Routing with Switch Virtual Interfaces (Cont.) 115  5.3.1.4 Inter-VLAN Routing with Routed Ports 116  5.3.1.5 Configuring Static Routes on a Catalyst 2960 117 5.3.2 Troubleshoot Layer 3 Switching 118  5.3.2.1 Layer 3 Switch Configuration Issues 118  5.3.2.2 Example: Troubleshooting Layer 3 Switching 118  5.3.2.3 Activity - Troubleshoot Layer 3 Switching Issues 119  5.3.2.4 Lab - Troubleshooting Inter-VLAN Routing 119 5.4 Summary 120 5.4.1 Summary 120  5.4.1.1 Class Activity The Inside Track 120  5.4.1.2 Packet Tracer - Skills Integration Challenge 120  5.4.1.3 Summary 120 Your Chapter Notes 121   Chapter 6 Static Routing 123 6.0 Static Routing 123 6.0.1.1 Introduction 123  6.0.1.2 Class Activity - Which Way Should We Go 123 6.1 Static Routing Implementation 124 6.1.1 Static Routing 124  6.1.1.1 Reach Remote Networks 124  6.1.1.2 Why Use Static Routing? 124  6.1.1.3 When to Use Static Routes 125  6.1.1.4 Activity - Identify the Advantages and Disadvantages of Static Routing 125 6.1.2 Types of Static Routes 125  6.1.2.1 Static Route Applications 125  6.1.2.2 Standard Static Route 126  6.1.2.3 Default Static Route 126  6.1.2.4 Summary Static Route 126  6.1.2.5 Floating Static Route 127  6.1.2.6 Activity - Identify the Type of Static Route 127 6.2 Configure Static and Default Routes 127 6.2.1 Configure IPv4 Static Routes 127  6.2.1.1 ip route Command 127  6.2.1.2 Next-Hop Options 128  6.2.1.3 Configure a Next-Hop Static Route 128  6.2.1.4 Configure a Directly Connected Static Route 129  6.2.1.5 Configure a Fully Specified Static Route 130  6.2.1.6 Verify a Static Route 131 6.2.2 Configure IPv4 Default Routes 131  6.2.2.1 Default Static Route 131  6.2.2.2 Configure a Default Static Route 131  6.2.2.3 Verify a Default Static Route 132  6.2.2.4 Packet Tracer - Configuring IPv4 Static and Default Routes 132  6.2.2.5 Lab - Configuring IPv4 Static and Default Routes 132 6.2.3 Configure IPv6 Static Routes 132  6.2.3.1 The ipv6 route Command 132  6.2.3.2 Next-Hop Options 133  6.2.3.3 Configure a Next-Hop Static IPv6 Route 133  6.2.3.4 Configure a Directly Connected Static IPv6 Route 134  6.2.3.5 Configure a Fully Specified Static IPv6 Route 134  6.2.3.6 Verify IPv6 Static Routes 135 6.2.4 Configure IPv6 Default Routes 135  6.2.4.1 Default Static IPv6 Route 135  6.2.4.2 Configure a Default Static IPv6 Route 136  6.2.4.3 Verify a Default Static Route 136  6.2.4.4 Packet Tracer - Configuring IPv6 Static and Default Routes 136  6.2.4.5 Lab - Configuring IPv6 Static and Default Routes 136 6.3 Review of CIDR and VLSM 137 6.3.1 Classful Addressing 137  6.3.1.1 Classful Network Addressing 137  6.3.1.2 Classful Subnet Masks 137  6.3.1.3 Classful Routing Protocol Example 138  6.3.1.4 Classful Addressing Waste 138 6.3.2 CIDR 139  6.3.2.1 Classless Inter-Domain Routing 139  6.3.2.2 CIDR and Route Summarization 139  6.3.2.3 Static Routing CIDR Example 140  6.3.2.4 Classless Routing Protocol Example 140 6.3.3 VLSM 141  6.3.3.1 Fixed-Length Subnet Masking 141  6.3.3.2 Variable-Length Subnet Masking 141  6.3.3.3 VLSM in Action 142  6.3.3.4 Subnetting Subnets 142  6.3.3.5 VLSM Example 142  6.3.3.6 Packet Tracer - Designing and Implementing a VLSM Addressing Scheme 143  6.3.3.7 Lab - Designing and Implementing Addressing with VLSM 143 6.4 Configure Summary and Floating Static Routes 143 6.4.1 Configure IPv4 Summary Routes 143  6.4.1.1 Route Summarization 143  6.4.1.2 Calculate a Summary Route 144  6.4.1.3 Summary Static Route Example 144  6.4.1.4 Activity - Determine the Summary Network Address and Prefix 145  6.4.1.5 Packet Tracer - Configuring IPv4 Route Summarization - Scenario 1 145  6.4.1.6 Packet Tracer - Configuring IPv4 Route Summarization - Scenario 2 145 6.4.2 Configure IPv6 Summary Routes 145  6.4.2.1 Summarize IPv6 Network Addresses 145  6.4.2.2 Calculate IPv6 Network Addresses 145  6.4.2.3 Configure an IPv6 Summary Address 146  6.4.2.4 Packet Tracer - Configuring IPv6 Route Summarization 146  6.4.2.5 Lab - Calculating Summary Routes with IPv4 and IPv6 146 6.4.3 Configure Floating Static Routes 146  6.4.3.1 Floating Static Routes 146  6.4.3.2 Configure a Floating Static Route 147  6.4.3.3 Test the Floating Static Route 147  6.4.3.4 Packet Tracer - Configuring a Floating Static Route 147 6.5 Troubleshoot Static and Default Route Issues 148 6.5.1 Packet Processing with Static Routes 148  6.5.1.1 Static Routes and Packet Forwarding 148 6.5.2 Troubleshoot IPv4 Static and Default Route Configuration 148  6.5.2.1 Troubleshoot a Missing Route 148  6.5.2.2 Solve a Connectivity Problem 149  6.5.2.3 Packet Tracer - Troubleshooting Static Routes 150  6.5.2.4 Packet Tracer - Troubleshooting VLSM and Route Summarization 150  6.5.2.5 Lab - Troubleshooting Static Routes 150 6.6 Summary 150 6.6.1.1 Class Activity - Make It Static 150  6.6.1.2 Packet Tracer Skills Integration Challenge 151  6.6.1.3 Summary 151 Your Chapter Notes 152   Chapter 7 Routing Dynamically 153 7.0 Routing Dynamically 153 7.0.1.1 Introduction 153  7.0.1.2 Class Activity How Much Does This Cost 153 7.1 Dynamic Routing Protocols 154 7.1.1 Dynamic Routing Protocol Operation 154  7.1.1.1 The Evolution of Dynamic Routing Protocols 154  7.1.1.2 Purpose of Dynamic Routing Protocols 155  7.1.1.3 The Role of Dynamic Routing Protocols 155  7.1.1.4 Activity - Identify Components of a Routing Protocol 156 7.1.2 Dynamic versus Static Routing 156  7.1.2.1 Using Static Routing 156  7.1.2.2 Static Routing Scorecard 156  7.1.2.3 Using Dynamic Routing Protocols 156  7.1.2.4 Dynamic Routing Scorecard 157  7.1.2.5 Activity - Compare Static and Dynamic Routing 157 7.1.3 Routing Protocol Operating Fundamentals 157  7.1.3.1 Dynamic Routing Protocol Operation 157  7.1.3.2 Cold Start 157  7.1.3.3 Network Discovery 158  7.1.3.4 Exchanging the Routing Information 159  7.1.3.5 Achieving Convergence 160  7.1.3.6 Packet Tracer - Investigating Convergence 160 7.1.4 Types of Routing Protocols 161  7.1.4.1 Classifying Routing Protocols 161  7.1.4.2 IGP and EGP Routing Protocols 161  7.1.4.3 Distance Vector Routing Protocols 162  7.1.4.4 Link-State Routing Protocols 163  7.1.4.5 Classful Routing Protocols 163  7.1.4.6 Classless Routing Protocols 164  7.1.4.7 Routing Protocol Characteristics 165  7.1.4.8 Routing Protocol Metrics 165  7.1.4.9 Activity - Classify Dynamic Routing Protocols 166  7.1.4.10 Activity - Compare Routing Protocols 166  7.1.4.11 Activity - Match the Metric to the Protocol 166 7.2 Distance Vector Dynamic Routing 166 7.2.1 Distance Vector Routing Protocol Operation 166  7.2.1.1 Distance Vector Technologies 166  7.2.1.2 Distance Vector Algorithm 166  7.2.1.3 Activity - Identify Distance Vector Terminology 167 7.2.2 Types of Distance Vector Routing Protocols 167 7.2.2.1 Routing Information Protocol 167  7.2.2.2 Enhanced Interior-Gateway Routing Protocol 168  7.2.2.3 Activity - Compare RIP and EIGRP 168  7.2.2.4 Packet Tracer - Comparing RIP and EIGRP Path Selection 168 7.3 RIP and RIPng Routing 169 7.3.1 Configuring the RIP Protocol 169  7.3.1.1 Router RIP Configuration Mode 169  7.3.1.2 Advertising Networks 169  7.3.1.3 Examining Default RIP Settings 170  7.3.1.4 Enabling RIPv2 170  7.3.1.5 Disabling Auto Summarization 171  7.3.1.6 Configuring Passive Interfaces 171  7.3.1.7 Propagating a Default Route 172  7.3.1.8 Packet Tracer - Configuring RIPv2 172 7.3.2 Configuring the RIPng Protocol 172  7.3.2.1 Advertising IPv6 Networks 172  7.3.2.2 Examining the RIPng Configuration 173  7.3.2.3 Packet Tracer - Configuring RIPng 174  7.3.2.4 Lab - Configuring RIPv2 174 7.4 Link-State Dynamic Routing 174 7.4.1 Link-State Routing Protocol Operation 174  7.4.1.1 Shortest Path First Protocols 174  7.4.1.2 Dijkstra’s Algorithm 174  7.4.1.3 SPF Example 175 7.4.2 Link-State Updates 175  7.4.2.1 Link-State Routing Process 175  7.4.2.2 Link and Link-State 176  7.4.2.3 Say Hello 176  7.4.2.4 Building the Link-State Packet 177  7.4.2.5 Flooding the LSP 177  7.4.2.6 Building the Link-State Database 178  7.4.2.7 Building the SPF Tree 178  7.4.2.8 Adding OSPF Routes to the Routing Table 179  7.4.2.9 Activity - Building the Link-State Database and SPF Tree 179 7.4.3 Why Use Link-State Routing Protocols 179  7.4.3.1 Why Use Link-State Protocols? 179  7.4.3.2 Disadvantages of Link-State Protocols 180  7.4.3.3 Protocols that Use Link-State 180 7.5 The Routing Table 181 7.5.1 Parts of an IPv4 Route Entry 181  7.5.1.1 Routing Table Entries 181  7.5.1.2 Directly Connected Entries 181  7.5.1.3 Remote Network Entries 182  7.5.1.4 Activity - Identify Parts of an IPv4 Routing Table Entry 182 7.5.2 Dynamically Learned IPv4 Routes 182  7.5.2.1 Routing Table Terms 182  7.5.2.2 Ultimate Route 183  7.5.2.3 Level 1 Route 183  7.5.2.4 Level 1 Parent Route 183  7.5.2.5 Level 2 Child Route 183  7.5.2.6 Activity - Identify Parent and Child IPv4 Routes 184 7.5.3 The IPv4 Route Lookup Process 184  7.5.3.1 Route Lookup Process 184  7.5.3.2 Best Route = Longest Match 184  7.5.3.3 Activity - Determine the Longest Match Route 185 7.5.4 Analyze an IPv6 Routing Table 185  7.5.4.1 IPv6 Routing Table Entries 185  7.5.4.2 Directly Connected Entries 185  7.5.4.3 Remote IPv6 Network Entries 186  7.5.4.4 Activity - Identify Parts of an IPv6 Routing Table Entry 187 7.6 Summary 187 7.6.1.1 Class Activity IPv6 - Details, Details... 187  7.6.1.2 Summary 187 Your Chapter Notes 189   Chapter 8 Single-Area OSPF 191 8.0 Single-Area OSPF 191 8.0.1.1 Introduction 191  8.0.1.2 Class Activity - Can Submarines Swim? 191 8.1 Characteristics of OSPF 191 8.1.1 Open Shortest Path First 191  8.1.1.1 Evolution of OSPF 191  8.1.1.2 Features of OSPF 192  8.1.1.3 Components of OSPF 193  8.1.1.4 Link-State Operation 193  8.1.1.5 Single-Area and Multiarea OSPF 194  8.1.1.6 Activity - Identify OSPF Features and Terminology 195 8.1.2 OSPF Messages 195  8.1.2.1 Encapsulating OSPF Messages 195  8.1.2.2 Types of OSPF Packets 195  8.1.2.3 Hello Packet 196  8.1.2.4 Hello Packet Intervals 197  8.1.2.5 Link-State Updates 197  8.1.2.6 Activity - Identify the OSPF Packet Types 198 8.1.3 OSPF Operation 198  8.1.3.1 OSPF Operational States 198  8.1.3.2 Establish Neighbor Adjacencies 198  8.1.3.3 OSPF DR and BDR 199  8.1.3.4 Synchronizing OSPF Databases 200  8.1.3.5 Activity - Identify the OSPF States for Establishing Adjacency 200  8.1.3.6 Video Demonstration - Observing OSPF Protocol Communications 200 8.2 Configuring Single-Area OSPFv2 201 8.2.1 OSPF Router ID 201  8.2.1.1 OSPF Network Topology 201  8.2.1.2 Router OSPF Configuration Mode 201  8.2.1.3 Router IDs 201  8.2.1.4 Configuring an OSPF Router ID 202  8.2.1.5 Modifying a Router ID 203  8.2.1.6 Using a Loopback Interface as the Router ID 203 8.2.2 Configure Single-Area OSPFv2 203  8.2.2.1 Enabling OSPF on Interfaces 203  8.2.2.2 Wildcard Mask 204  8.2.2.3 The network Command 204  8.2.2.4 Passive Interface 205  8.2.2.5 Configuring Passive Interfaces 205  8.2.2.6 Activity - Calculate the Subnet and Wildcard Masks 206  8.2.2.7 Packet Tracer - Configuring OSPFv2 in a Single-area 206 8.2.3 OSPF Cost 206  8.2.3.1 OSPF Metric = Cost 206  8.2.3.2 OSPF Accumulates Costs 207  8.2.3.3 Adjusting the Reference Bandwidth 207  8.2.3.4 Default Interface Bandwidths 208  8.2.3.5 Adjusting the Interface Bandwidths 209  8.2.3.6 Manually Setting the OSPF Cost 209 8.2.4 Verify OSPF 210  8.2.4.1 Verify OSPF Neighbors 210  8.2.4.2 Verify OSPF Protocol Settings 210  8.2.4.3 Verify OSPF Process Information 211  8.2.4.4 Verify OSPF Interface Settings 211  8.2.4.5 Lab - Configuring Basic Single-Area OSPFv2 211 8.3 Configure Single-Area OSPFv3 211 8.3.1 OSPFv2 vs. OSPFv3 211  8.3.1.1 OSPFv3 211  8.3.1.2 Similarities Between OSPFv2 to OSPFv3 212  8.3.1.3 Differences Between OSPFv2 and OSPFv3 213  8.3.1.4 Link-Local Addresses 213  8.3.1.5 Activity - Compare and Contrast OSPFv2 and OSPFv3 214 8.3.2 Configuring OSPFv3 214  8.3.2.1 OSPFv3 Network Topology 214  8.3.2.2 Link-Local Addresses 214  8.3.2.3 Assigning Link-Local Addresses 214  8.3.2.4 Configuring the OSPFv3 Router ID 215  8.3.2.5 Modifying an OSPFv3 Router ID 216  8.3.2.6 Enabling OSPFv3 on Interfaces 216 8.3.3 Verify OSPFv3 217  8.3.3.1 Verify OSPFv3 Neighbors 217  8.3.3.2 Verify OSPFv3 Protocol Settings 217  8.3.3.3 Verify OSPFv3 Interfaces 217  8.3.3.4 Verify the IPv6 Routing Table 218  8.3.3.5 Packet Tracer - Configuring Basic OSPFv3 218  8.3.3.6 Lab - Configuring Basic Single-Area OSPFv3 218 8.4 Summary 218 8.4.1.1 Class Activity - Stepping Through OSPFv3 218  8.4.1.2 Packet Tracer - Skills Integration Challenge 219  8.4.1.3 Summary 219 Your Chapter Notes 220   Chapter 9 Access Control Lists 221 9.0 Access Control Lists 221 9.0.1.1 Introduction 221  9.0.1.2 Class Activity Permit Me to Assist You 221 9.1 IP ACL Operation 222 9.1.1 Purpose of ACLs 222  9.1.1.1 What is an ACL? 222  9.1.1.2 A TCP Conversation 223  9.1.1.3 Packet Filtering 223  9.1.1.4 Packet Filtering (Cont.) 224  9.1.1.5 ACL Operation 225  9.1.1.6 Packet Tracer - ACL Demonstration 225 9.1.2 Standard versus Extended IPv4 ACLs 225  9.1.2.1 Types of Cisco IPv4 ACLs 225  9.1.2.2 Numbering and Naming ACLs 226 9.1.3 Wildcard Masks in ACLs 226  9.1.3.1 Introducing ACL Wildcard Masking 226  9.1.3.2 Wildcard Mask Examples 227  9.1.3.3 Calculating the Wildcard Mask 228  9.1.3.4 Wildcard Mask Keywords 229  9.1.3.5 Examples Wildcard Mask Keywords 229  9.1.3.6 Activity - Determine the Correct Wildcard Mask 229  9.1.3.7 Activity - Determine the Permit or Deny 229 9.1.4 Guidelines for ACL creation 229  9.1.4.1 General Guidelines for Creating ACLs 229  9.1.4.2 ACL Best Practices 230  9.1.4.3 Activity - ACL Operation 230 9.1.5 Guidelines for ACL Placement 230  9.1.5.1 Where to Place ACLs 230  9.1.5.2 Standard ACL Placement 231  9.1.5.3 Extended ACL Placement 232  9.1.5.4 Activity - Placing Standard and Extended ACLs 233 9.2 Standard IPv4 ACLs 233 9.2.1 Configure Standard IPv4 ACLs 233  9.2.1.1 Entering Criteria Statements 233  9.2.1.2 Configuring a Standard ACL 233  9.2.1.3 Configuring a Standard ACL (Cont.) 233  9.2.1.4 Internal Logic 234  9.2.1.5 Applying Standard ACLs to Interfaces 235  9.2.1.6 Applying Standard ACLs to Interfaces (Cont.) 235  9.2.1.7 Creating Named Standard ACLs 236  9.2.1.8 Commenting ACLs 236  9.2.1.9 Activity - Configuring Standard ACLs 237  9.2.1.10 Packet Tracer - Configuring Standard ACLs 237  9.2.1.11 Packet Tracer - Configuring Named Standard ACLs 237 9.2.2 Modify IPv4 ACLs 237  9.2.2.1 Editing Standard Numbered ACLs 237  9.2.2.2 Editing Standard Numbered ACLs (Cont.) 238  9.2.2.3 Editing Standard Named ACLs 239  9.2.2.4 Verifying ACLs 239  9.2.2.5 ACL Statistics 239  9.2.2.6 Standard ACL Sequence Numbers 240  9.2.2.7 Lab - Configuring and Verifying Standard ACLs 241 9.2.3 Securing VTY ports with a Standard IPv4 ACL 241  9.2.3.1 Configuring a Standard ACL to Secure a VTY Port 241  9.2.3.2 Verifying a Standard ACL used to Secure a VTY Port 242  9.2.3.3 Packet Tracer - Configuring an ACL on VTY Lines 242  9.2.3.4 Lab - Configuring and Verifying VTY Restrictions 242 9.3 Extended IPv4 ACLs 242 9.3.1 Structure of an Extended IPv4 ACL 242  9.3.1.1 Extended ACLs 242  9.3.1.2 Extended ACLs (Cont.) 243 9.3.2 Configure Extended IPv4 ACLs 243  9.3.2.1 Configuring Extended ACLs 243  9.3.2.2 Applying Extended ACLs to Interfaces 244  9.3.2.3 Filtering Traffic with Extended ACLs 244  9.3.2.4 Creating Named Extended ACLs 245  9.3.2.5 Verifying Extended ACLs 245  9.3.2.6 Editing Extended ACLs 246  9.3.2.7 Activity - Creating an Extended ACL Statement 246  9.3.2.8 Activity - Evaluating Extended ACEs 246  9.3.2.9 Activity - ACL Testlet 246  9.3.2.10 Packet Tracer - Configuring Extended ACLs - Scenario 1 246  9.3.2.11 Packet Tracer - Configuring Extended ACLs - Scenario 2 246  9.3.2.12 Packet Tracer - Configuring Extended ACLs - Scenario 3 246  9.3.2.13 Lab - Configuring and Verifying Extended ACLs 247 9.4 Troubleshoot ACLs 247 9.4.1 Processing Packets with ACLs 247  9.4.1.1 Inbound and Outbound ACL Logic 247  9.4.1.2 ACL Logic Operations 248  9.4.1.3 Standard ACL Decision Process 248  9.4.1.4 Extended ACL Decision Process 248  9.4.1.5 Activity - Place in Order the Steps of the ACL Decision Making Process 249 9.4.2 Common ACLs Errors 249  9.4.2.1 Troubleshooting Common ACL Errors - Example 1 249  9.4.2.2 Troubleshooting Common ACL Errors - Example 2 249  9.4.2.3 Troubleshooting Common ACL Errors - Example 3 249  9.4.2.4 Troubleshooting Common ACL Errors - Example 4 250  9.4.2.5 Troubleshooting Common ACL Errors - Example 5 250  9.4.2.6 Packet Tracer - Troubleshooting ACLs 250  9.4.2.7 Lab - Troubleshooting ACL Configuration and Placement 250  9.4.2.8 Packet Tracer - Skills Integration Challenge 251 9.5 IPv6 ACLs 251 9.5.1 IPv6 ACL Creation 251  9.5.1.1 Type of IPv6 ACLs 251  9.5.1.2 Comparing IPv4 and IPv6 ACLs 251 9.5.2 Configuring IPv6 ACLs 252  9.5.2.1 Configuring IPv6 Topology 252  9.5.2.2 Configuring IPv6 ACLs 252  9.5.2.3 Applying an IPv6 ACL to an Interface 253  9.5.2.4 IPv6 ACL Examples 253  9.5.2.5 Verifying IPv6 ACLs 254  9.5.2.6 Packet Tracer - Configuring IPv6 ACLs 254  9.5.2.7 Lab - Configuring and Verifying IPv6 ACLs 254 9.6 Summary 254 9.6.1.1 Class Activity FTP Denied 254  9.6.1.2 Summary 255 Your Chapter Notes 257   Chapter 10 DHCP 259 10.0 Introduction 259 10.0.1.1 Introduction 259  10.0.1.2 Class Activity - Own or Lease? 259 10.1 Dynamic Host Configuration Protocol v4 260 10.1.1 DHCPv4 Operation 260  10.1.1.1 Introducing DHCPv4 260  10.1.1.2 DHCPv4 Operation 261  10.1.1.3 DHCPv4 Message Format 262  10.1.1.4 DHCPv4 Discover and Offer Messages 263  10.1.1.5 Activity - Identify the Steps in DHCPv4 Operation 264 10.1.2 Configuring a Basic DHCPv4 Server 264  10.1.2.1 Configuring a Basic DHCPv4 Server 264  10.1.2.2 Verifying DHCPv4 265  10.1.2.3 DHCPv4 Relay 265  10.1.2.4 Lab - Configuring Basic DHCPv4 on a Router 266  10.1.2.5 Lab - Configuring Basic DHCPv4 on a Switch 267 10.1.3 Configure DHCPv4 Client 267  10.1.3.1 Configuring a Router as DHCPv4 Client 267  10.1.3.2 Configuring a SOHO Router as a DHCPv4 Client 267  10.1.3.3 Packet Tracer - Configuring DHCPv4 Using Cisco IOS 268 10.1.4 Troubleshoot DHCPv4 268  10.1.4.1 Troubleshooting Tasks 268  10.1.4.2 Verify Router DHCPv4 Configuration 269  10.1.4.3 Debugging DHCPv4 269  10.1.4.4 Lab - Troubleshooting DHCPv4 270 10.2 Dynamic Host Configuration Protocol v6 270 10.2.1 SLAAC and DHCPv6 270  10.2.1.1 Stateless Address Autoconfiguration (SLAAC) 270  10.2.1.2 SLAAC Operation 271  10.2.1.3 SLAAC and DHCPv6 272  10.2.1.4 SLAAC Option 272  10.2.1.5 Stateless DHCPv6 Option 272  10.2.1.6 Stateful DHCPv6 Option 273  10.2.1.7 DHCPv6 Operations 273  10.2.1.8 Activity - Identify the Steps in DHCPv6 Operation 274 10.2.2 Stateless DHCPv6 274  10.2.2.1 Configuring a Router as a Stateless DHCPv6 Server 274  10.2.2.2 Configuring a Router as a Stateless DHCPv6 Client 275  10.2.2.3 Verifying Stateless DHCPv6 275 10.2.3 Stateful DHCPv6 Server 276  10.2.3.1 Configuring a Router as a Stateful DHCPv6 Server 276  10.2.3.2 Configuring a Router as a Stateful DHCPv6 Client 276  10.2.3.3 Verifying Stateful DHCPv6 277  10.2.3.4 Configuring a Router as a DHCPv6 Relay Agent 277  10.2.3.5 Lab - Configuring Stateless and Stateful DHCPv6 278 10.2.4 Troubleshoot DHCPv6 278  10.2.4.1 Troubleshooting Tasks 278  10.2.4.2 Verify Router DHCPv6 Configuration 279  10.2.4.3 Debugging DHCPv6 279  10.2.4.4 Lab - Troubleshooting DHCPv6 280 10.3 Summary 280 10.3.1.1 Class Activity - IoE and DHCP 280  10.3.1.2 Packet Tracer Skills Integration Challenge 280  10.3.1.3 Summary 280 Your Chapter Notes 282   Chapter 11 Network Address Translation for IPv4 283 11.0 Introduction 283 11.0.1.1 Introduction 283  11.0.1.2 Class Activity Conceptual NAT 283 11.1 NAT Operation 284 11.1.1 NAT Characteristics 284  11.1.1.1 IPv4 Private Address Space 284  11.1.1.2 What is NAT? 284  11.1.1.3 NAT Terminology 285  11.1.1.4 NAT Terminology (Cont.) 286  11.1.1.5 How NAT Works 286  11.1.1.6 Activity - Identify the NAT Terminology 287 11.1.2 Types of NAT 287  11.1.2.1 Static NAT 287  11.1.2.2 Dynamic NAT 288  11.1.2.3 Port Address Translation (PAT) 288  11.1.2.4 Next Available Port 288  11.1.2.5 Comparing NAT and PAT 289  11.1.2.6 Packet Tracer - Investigating NAT Operation 289 11.1.3 Benefits of NAT 290  11.1.3.1 Benefits of NAT 290  11.1.3.2 Disadvantages of NAT 290 11.2 Configuring NAT 291 11.2.1 Configuring Static NAT 291  11.2.1.1 Configuring Static NAT 291  11.2.1.2 Analyzing Static NAT 292  11.2.1.3 Verifying Static NAT 292  11.2.1.4 Packet Tracer - Configuring Static NAT 293 11.2.2 Configuring Dynamic NAT 293  11.2.2.1 Dynamic NAT Operation 293  11.2.2.2 Configuring Dynamic NAT 293  11.2.2.3 Analyzing Dynamic NAT 294  11.2.2.4 Verifying Dynamic NAT 295  11.2.2.5 Packet Tracer - Configuring Dynamic NAT 296  11.2.2.6 Lab - Configuring Dynamic and Static NAT 296 11.2.3 Configuring Port Address Translation (PAT) 296  11.2.3.1 Configuring PAT: Address Pool 296  11.2.3.2 Configuring PAT: Single Address 297  11.2.3.3 Analyzing PAT 297  11.2.3.4 Verifying PAT 298  11.2.3.5 Activity - Identify the Address Information at Each Hop 299  11.2.3.6 Packet Tracer - Implementing Static and Dynamic NAT 299  11.2.3.7 Lab - Configuring NAT Pool Overload and PAT 299 11.2.4 Port Forwarding 299  11.2.4.1 Port Forwarding 299  11.2.4.2 SOHO Example 300  11.2.4.3 Configuring Port Forwarding with IOS 300  11.2.4.4 Packet Tracer - Configuring Port Forwarding on a Linksys Router 301 11.2.5 Configuring NAT and IPv6 301  11.2.5.1 NAT for IPv6? 301  11.2.5.2 IPv6 Unique Local Addresses 302  11.2.5.3 NAT for IPv6 303 11.3 Troubleshooting NAT 303 11.3.1 Troubleshooting NAT 303  11.3.1.1 Troubleshooting NAT: show commands 303  11.3.1.2 Troubleshooting NAT: debug command 304  11.3.1.3 Case Study 304  11.3.1.4 Packet Tracer - Verifying and Troubleshooting NAT Configurations 305  11.3.1.5 Lab - Troubleshooting NAT Configurations 305 11.4 Summary 306 11.4.1.1 Class Activity NAT Check 306  11.4.1.2 Packet Tracer - Skills Integration Challenge 306  11.4.1.3 Summary 306 Your Chapter Notes 307  


Best Sellers


Product Details
  • ISBN-13: 9781587133190
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Height: 273 mm
  • No of Pages: 336
  • Weight: 756 gr
  • ISBN-10: 1587133199
  • Publisher Date: 07 Nov 2013
  • Binding: Paperback
  • Language: English
  • Spine Width: 18 mm
  • Width: 216 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Routing and Switching Essentials Course Booklet
Pearson Education (US) -
Routing and Switching Essentials Course Booklet
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Routing and Switching Essentials Course Booklet

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!