| |
| |
| |
LAN Design | |
| |
| |
Objectives | |
| |
| |
Key Terms | |
| |
| |
Switched LAN Architecture | |
| |
| |
The Hierarchical Network Model | |
| |
| |
Access Layer | |
| |
| |
Distribution Layer | |
| |
| |
Core Layer | |
| |
| |
A Hierarchical Network in a Medium-Sized Business | |
| |
| |
Benefits of a Hierarchical Network | |
| |
| |
Principles of Hierarchical Network Design | |
| |
| |
Network Diameter | |
| |
| |
Bandwidth Aggregation | |
| |
| |
Redundancy | |
| |
| |
What Is a Converged Network? | |
| |
| |
Legacy Equipment | |
| |
| |
Advanced Technology | |
| |
| |
New Options | |
| |
| |
Separate Voice, Video, and Data Networks | |
| |
| |
Matching Switches to Specific LAN Functions | |
| |
| |
Considerations for Hierarchical Network Switches | |
| |
| |
Traffic Flow Analysis | |
| |
| |
User Community Analysis | |
| |
| |
Data Stores and Data Servers Analysis | |
| |
| |
Topology Diagrams | |
| |
| |
Switch Features | |
| |
| |
Switch Form Factors | |
| |
| |
Switch Performance | |
| |
| |
Power over Ethernet and Layer 3 Functionality | |
| |
| |
Switch Features in a Hierarchical Network | |
| |
| |
Access Layer Switch Features | |
| |
| |
Distribution Layer Switch Features | |
| |
| |
Core Layer Switch Features | |
| |
| |
Switches for Small and Medium Sized Business (SMB) | |
| |
| |
Catalyst Express 500 | |
| |
| |
Catalyst 2960 | |
| |
| |
Catalyst 3560 | |
| |
| |
Catalyst 3750 | |
| |
| |
Catalyst 4500 | |
| |
| |
Catalyst 4900 | |
| |
| |
Catalyst 6500 | |
| |
| |
Comparing Switches | |
| |
| |
Summary | |
| |
| |
Labs | |
| |
| |
Check Your Understanding | |
| |
| |
Challenge Questions and Activities | |
| |
| |
| |
Basic Switch Concepts and Configuration | |
| |
| |
Objectives | |
| |
| |
Key Terms | |
| |
| |
Introduction to Ethernet/802.3 LANs | |
| |
| |
Key Elements of Ethernet/802.3 Networks | |
| |
| |
CSMA/CD | |
| |
| |
Ethernet Communications | |
| |
| |
Duplex Settings | |
| |
| |
Switch Port Settings | |
| |
| |
Switch MAC Address Table | |
| |
| |
Design Considerations for Ethernet/802.3 Networks | |
| |
| |
Bandwidth and Throughput | |
| |
| |
Collision Domains | |
| |
| |
Broadcast Domains | |
| |
| |
Network Latency | |
| |
| |
Network Congestion | |
| |
| |
LAN Segmentation | |
| |
| |
LAN Design Considerations | |
| |
| |
Forwarding Frames Using a Switch | |
| |
| |
Switch Forwarding Methods | |
| |
| |
Symmetric and Asymmetric Switching | |
| |
| |
Memory Buffering | |
| |
| |
Layer 2 and Layer 3 Switching | |
| |
| |
Switch Management Configuration | |
| |
| |
Navigating Command-Line Interface Modes | |
| |
| |
GUI-Based Alternatives to the CLI | |
| |
| |
Using the Help Facility | |
| |
| |
Accessing the Command History | |
| |
| |
Switch Boot Sequence | |
| |
| |
Prepare to Configure the Switch | |
| |
| |
Basic Switch Configuration | |
| |
| |
Management Interface | |
| |
| |
Default Gateway | |
| |
| |
Duplex and Speed | |
| |
| |
HTTP Access | |
| |
| |
MAC Address Table Management | |
| |
| |
Verifying Switch Configuration | |
| |
| |
Basic Switch Management | |
| |
| |
Backing Up and Restoring Switch Configuration Files | |
| |
| |
Using a TFTP Server with Switch Configuration Files | |
| |
| |
Clearing Switch Configuration Information | |
| |
| |
Configuring Switch Security | |
| |
| |
Configuring Password Options | |
| |
| |
Securing Console Access | |
| |
| |
Securing Virtual Terminal Access | |
| |
| |
Securing Privileged EXEC Access | |
| |
| |
Encrypting Switch Passwords | |
| |
| |
Password Recovery | |
| |
| |
Login Banners | |
| |
| |
Configure Telnet and SSH | |
| |
| |
Configuring Telnet | |
| |
| |
Configuring SSH | |
| |
| |
Common Security Attacks | |
| |
| |
MAC Address Flooding | |
| |
| |
Spoofing Attacks | |
| |
| |
CDP Attacks | |
| |
| |
Telnet Attacks | |
| |
| |
Security Tools | |
| |
| |
Configuring Port Security | |
| |
| |
Securing Unused Ports | |
| |
| |
Summary | |
| |
| |
Labs | |
| |
| |
Check Your Understanding | |
| |
| |
Challenge Questions and Activities | |
| |
| |
| |
VLANs | |
| |
| |
Objectives | |