| |
| |
| |
LAN Design | |
| |
| |
Objectives | |
| |
| |
Key Terms | |
| |
| |
Switched LAN Architecture | |
| |
| |
The Hierarchical Network Model | |
| |
| |
Access Layer | |
| |
| |
Distribution Layer | |
| |
| |
Core Layer | |
| |
| |
A Hierarchical Network in a Medium-Sized Business | |
| |
| |
Benefits of a Hierarchical Network | |
| |
| |
Principles of Hierarchical Network Design | |
| |
| |
Network Diameter | |
| |
| |
Bandwidth Aggregation | |
| |
| |
Redundancy | |
| |
| |
What Is a Converged Network? | |
| |
| |
Legacy Equipment | |
| |
| |
Advanced Technology | |
| |
| |
New Options | |
| |
| |
Separate Voice, Video, and Data Networks | |
| |
| |
Matching Switches to Specific LAN Functions | |
| |
| |
Considerations for Hierarchical Network Switches | |
| |
| |
Traffic Flow Analysis | |
| |
| |
User Community Analysis | |
| |
| |
Data Stores and Data Servers Analysis | |
| |
| |
Topology Diagrams | |
| |
| |
Switch Features | |
| |
| |
Switch Form Factors | |
| |
| |
Switch Performance | |
| |
| |
Power over Ethernet and Layer 3 Functionality | |
| |
| |
Switch Features in a Hierarchical Network | |
| |
| |
Access Layer Switch Features | |
| |
| |
Distribution Layer Switch Features | |
| |
| |
Core Layer Switch Features | |
| |
| |
Switches for Small and Medium Sized Business (SMB) | |
| |
| |
Catalyst Express 500 | |
| |
| |
Catalyst 2960 | |
| |
| |
Catalyst 3560 | |
| |
| |
Catalyst 3750 | |
| |
| |
Catalyst 4500 | |
| |
| |
Catalyst 4900 | |
| |
| |
Catalyst 6500 | |
| |
| |
Comparing Switches | |
| |
| |
Summary | |
| |
| |
Labs | |
| |
| |
Check Your Understanding | |
| |
| |
Challenge Questions and Activities | |
| |
| |
| |
Basic Switch Concepts and Configuration | |
| |
| |
Objectives | |
| |
| |
Key Terms | |
| |
| |
Introduction to Ethernet/802.3 LANs | |
| |
| |
Key Elements of Ethernet/802.3 Networks | |
| |
| |
CSMA/CD | |
| |
| |
Ethernet Communications | |
| |
| |
Duplex Settings | |
| |
| |
Switch Port Settings | |
| |
| |
Switch MAC Address Table | |
| |
| |
Design Considerations for Ethernet/802.3 Networks | |
| |
| |
Bandwidth and Throughput | |
| |
| |
Collision Domains | |
| |
| |
Broadcast Domains | |
| |
| |
Network Latency | |
| |
| |
Network Congestion | |
| |
| |
LAN Segmentation | |
| |
| |
LAN Design Considerations | |
| |
| |
Forwarding Frames Using a Switch | |
| |
| |
Switch Forwarding Methods | |
| |
| |
Symmetric and Asymmetric Switching | |
| |
| |
Memory Buffering | |
| |
| |
Layer 2 and Layer 3 Switching | |
| |
| |
Switch Management Configuration | |
| |
| |
Navigating Command-Line Interface Modes | |
| |
| |
GUI-Based Alternatives to the CLI | |
| |
| |
Using the Help Facility | |
| |
| |
Accessing the Command History | |
| |
| |
Switch Boot Sequence | |
| |
| |
Prepare to Configure the Switch | |
| |
| |
Basic Switch Configuration | |
| |
| |
Management Interface | |
| |
| |
Default Gateway | |
| |
| |
Duplex and Speed | |
| |
| |
HTTP Access | |
| |
| |
MAC Address Table Management | |
| |
| |
Verifying Switch Configuration | |
| |
| |
Basic Switch Management | |
| |
| |
Backing Up and Restoring Switch Configuration Files | |
| |
| |
Using a TFTP Server with Switch Configuration Files | |
| |
| |
Clearing Switch Configuration Information | |
| |
| |
Configuring Switch Security | |
| |
| |
Configuring Password Options | |
| |
| |
Securing Console Access | |
| |
| |
Securing Virtual Terminal Access | |
| |
| |
Securing Privileged EXEC Access | |
| |
| |
Encrypting Switch Passwords | |
| |
| |
Password Recovery | |
| |
| |
Login Banners | |
| |
| |
Configure Telnet and SSH | |
| |
| |
Configuring Telnet | |
| |
| |
Configuring SSH | |
| |
| |
Common Security Attacks | |
| |
| |
MAC Address Flooding | |
| |
| |
Spoofing Attacks | |
| |
| |
CDP Attacks | |
| |
| |
Telnet Attacks | |
| |
| |
Security Tools | |
| |
| |
Configuring Port Security | |
| |
| |
Securing Unused Ports | |
| |
| |
Summary | |
| |
| |
Labs | |
| |
| |
Check Your Understanding | |
| |
| |
Challenge Questions and Activities | |
| |
| |
| |
VLANs | |
| |
| |
Objectives | |
| |
| |
Key Terms | |
| |
| |
Introducing VLANs | |
| |
| |
Defining VLANs | |
| |
| |
Benefits of VLANs | |
| |
| |
VLAN ID Ranges | |
| |
| |
Types of VLANs | |
| |
| |
Voice VLANs | |
| |
| |
Network Application Traffic Types | |
| |
| |
Switch Port Membership Modes | |
| |
| |
Controlling Broadcast Domains with VLANs | |
| |
| |
VLAN Trunking | |
| |
| |
VLAN Trunks | |
| |
| |
IEEE 802.1Q Frame Tagging | |
| |
| |
Native VLANs | |
| |
| |
Trunking Operation | |
| |
| |
Trunking Modes | |
| |
| |
Configure VLANs and Trunks | |
| |
| |
Configure a VLAN | |
| |
| |
Managing VLANs | |
| |
| |
Managing VLAN Memberships | |
| |
| |
Configure a Trunk | |
| |
| |
Troubleshooting VLANs and Trunks | |
| |
| |
Common Problems with Trunks | |
| |
| |
A Common Problem with VLAN Configurations | |
| |
| |
Summary | |
| |
| |
Labs | |
| |
| |
Check Your Understanding | |
| |
| |
Challenge Questions and Activities | |
| |
| |
| |
VTP | |
| |
| |
Objectives | |
| |
| |
Key Terms | |
| |
| |
VTP Concepts | |
| |
| |
What Is VTP? | |
| |
| |
Benefits of VTP | |
| |
| |
VTP Components | |
| |
| |
VTP Operation | |
| |
| |
Default VTP Configuration | |
| |
| |
VTP Domains | |
| |
| |
VTP Advertising | |
| |
| |
VTP Configuration Revision Number | |
| |
| |
VTP Advertisement Types | |
| |
| |
VTP Modes | |
| |
| |
VTP Server-to-Client Behavior | |
| |
| |
VTP Server-to-Transparent-to-Client Behavior | |
| |
| |
VTP Pruning | |
| |
| |
VTP Pruning in Action | |
| |
| |
Configure VTP | |
| |
| |
Configuring VTP | |
| |
| |
Steps to Configuring VTP | |
| |
| |
Troubleshooting VTP Configurations | |
| |
| |
Incompatible VTP Versions | |
| |
| |
VTP Password Issues | |
| |
| |
Incorrect VTP Domain Name | |
| |
| |
All Switches Set to VTP Client Mode | |
| |
| |
VTP Troubleshooting Example | |
| |
| |
Managing VLANs on a VTP Server | |
| |
| |
Summary | |
| |
| |
Labs | |
| |
| |
Check Your Understanding | |
| |
| |
Challenge Questions and Activities | |
| |
| |
| |
STP | |
| |
| |
Objectives | |
| |
| |
Key Terms | |
| |
| |
Redundant Layer 2 Topologies | |
| |
| |
Redundancy | |
| |
| |
Issues with Redundancy | |
| |
| |
Broadcast Storms | |
| |
| |
Duplicate Unicast Frames | |
| |
| |
Real-World Redundancy Issues | |
| |
| |
Loops in the Wiring Closet | |
| |
| |
Loops in Cubicles | |
| |
| |
Introduction to STP | |
| |
| |
Spanning-Tree Algorithm (STA) | |
| |
| |
STP Topology | |
| |
| |
Port Types in the Spanning-Tree Algorithm | |
| |
| |
Root Bridge | |
| |
| |
Best Paths | |
| |
| |
STP BPDU | |
| |
| |
BPDU Process | |
| |
| |
Bridge ID | |
| |
| |
Configure and Verify the BID | |
| |
| |
Port Roles | |
| |
| |
Configure Port Priority | |
| |
| |
Port Role Decisions | |
| |
| |
STP Port States and BPDU Timers | |
| |
| |
Cisco PortFast | |
| |
| |
STP Convergence | |
| |
| |
| |
Elect a Root Bridge | |
| |
| |
Verify Root Bridge Election | |
| |
| |
| |
Elect Root Ports | |
| |
| |
Verify Root Port Election | |
| |
| |
| |
Elect Designated and Nondesignated Ports | |
| |
| |
Verify Designated and Nondesignated Port Election | |
| |
| |
STP Topology Change | |
| |
| |
PVST+, RSTP, and Rapid PVST+ | |
| |
| |
Cisco and IEEE STP Variants | |
| |
| |
Per-VLAN Spanning-Tree (PVST) Overview | |
| |
| |
Per-VLAN Spanning-Tree Plus (PVST+) Overview | |
| |
| |
Rapid Spanning-Tree Protocol (RSTP) Overview | |
| |
| |
Multiple Spanning-Tree Protocol (MSTP) Overview | |
| |
| |
PVST+ | |
| |
| |
Configure PVST+ | |
| |
| |
RSTP | |
| |
| |
RSTP BPDU | |
| |
| |
Edge Ports | |
| |
| |
Link Types | |
| |
| |
RSTP Port States and Port Roles | |
| |
| |
RSTP Proposal and Agreement Process | |
| |
| |
Configuring Rapid PVST+ | |
| |
| |
Design STP for Trouble Avoidance | |
| |
| |
Minimize the Number of Blocked Ports | |
| |
| |
Use Layer 3 Switching | |
| |
| |
Keep STP Even if It Is Unnecessary | |
| |
| |
Keep Traffic off of the Management VLAN | |
| |
| |
Troubleshoot STP Operation | |
| |
| |
PortFast Configuration Error | |
| |
| |
Network Diameter Issues | |
| |
| |
Summary | |
| |
| |
Labs | |
| |
| |
Check Your Understanding | |
| |
| |
Challenge Questions and Activities | |
| |
| |
| |
Inter-VLAN Routing | |
| |
| |
Objectives | |
| |
| |
Key Terms | |
| |
| |
Inter-VLAN Routing | |
| |
| |
Introducing Inter-VLAN Routing | |
| |
| |
One-Router-Interface-per-VLAN | |
| |
| |
Router-on-a-Stick | |
| |
| |
Layer 3 Switch | |
| |
| |
Interfaces and Subinterfaces | |
| |
| |
One-Router-Interface-per-VLAN | |
| |
| |
Router-on-a-Stick | |
| |
| |
Considerations for Inter-VLAN Routing Methods | |
| |
| |
Configuring Inter-VLAN Routing | |
| |
| |
Configure Inter-VLAN Routing | |
| |
| |
Configure Router-on-a-Stick Inter-VLAN Routing | |
| |
| |
Troubleshooting Inter-VLAN Routing | |
| |
| |
Switch Configuration Issues | |
| |
| |
Switch Cisco IOS Commands for Troubleshooting | |
| |
| |
Router Configuration Issues | |
| |
| |
Router Cisco IOS Commands for Troubleshooting | |
| |
| |
IP Addressing Issues | |
| |
| |
IP Addressing Cisco IOS Verification Commands | |
| |
| |
Summary | |
| |
| |
Labs | |
| |
| |
Check Your Understanding | |
| |
| |
Challenge Questions and Activities | |
| |
| |
| |
Basic Wireless Concepts and Configuration | |
| |
| |
Objectives | |
| |
| |
Key Terms | |
| |
| |
The Wireless LAN | |
| |
| |
Why Use Wireless? | |
| |
| |
Wireless LANs | |
| |
| |
Comparing a WLAN to a LAN | |
| |
| |
Wireless LAN Components | |
| |
| |
Wireless LAN Standards | |
| |
| |
Wi-Fi Certification | |
| |
| |
Wireless Infrastructure Components | |
| |
| |
Wireless NICs | |
| |
| |
Wireless Access Points | |
| |
| |
Wireless Routers | |
| |
| |
Wireless Operation | |
| |
| |
Configurable Wireless Parameters | |
| |
| |
Wireless Topologies | |
| |
| |
Wireless Association | |
| |
| |
Planning the Wireless LAN | |
| |
| |
Wireless LAN Security | |
| |
| |
Threats to Wireless Security | |
| |
| |
Rogue Access Points | |
| |
| |
Man-in-the-Middle Attacks | |
| |
| |
Denial of Service | |
| |
| |
Wireless Security Protocols | |
| |
| |
Authenticating the Wireless LAN | |
| |
| |
Wireless Encryption | |
| |
| |
Controlling Access to the WLAN | |
| |
| |
Configure Wireless LAN Access | |
| |
| |
Configuring the Wireless Access Point | |
| |
| |
Configuring Basic Wireless Settings | |
| |
| |
Configuring Wireless Security | |
| |
| |
Configuring a Wireless NIC | |
| |
| |
Scan for SSIDs | |
| |
| |
Select the Wireless Security Protocol | |
| |
| |
Verify Connectivity to the WLAN | |
| |
| |
Troubleshooting Simple WLAN Problems | |
| |
| |
A Systematic Approach to WLAN Troubleshooting | |
| |
| |
Solve Access Point Radio and Firmware Issues | |
| |
| |
Channel Settings | |
| |
| |
RF Interference | |
| |
| |
Access Point Placement | |
| |
| |
Authentication and Encryption | |
| |
| |
Summary | |
| |
| |
Labs | |
| |
| |
Check Your Understanding | |
| |
| |
Challenge Questions and Activities | |
| |
| |
Appendix: Check Your Understanding and Challenge Questions | |
| |
| |
Answer Key | |
| |
| |
Glossary | |