Documente Academic
Documente Profesional
Documente Cultură
Foundation Learning
Guide Chapter
Ch1 Fundamentals
Review
Switching Introduction
Hubs and Swtiches
Bridges and Switches
Switches of Today
Broadcast Domains
MAC Addresses
The Basic Ethernet Frame Format
Basic Switching Function
VLANs
The Spanning Tree Protocol
Trunking
Port-Channels
MultiLayer Switching (MLS)
VTP Authentication
VTP Advertisements
VTP Message types
Summary Advertisements
Subset Advertisements
Advertisement Requests
UplinkFast
BackboneFast
PortFast
Root Guard
UDLD
UDLD Recommended Practices
FlexLinks
STP Stability Mechanisms Recommendations
Implementing Multiple Spanning Tree Protocol
Configuring MST
Configuring MST Path Cost
Configuring MST Port Priority
Network Management
AAA
Authenetication Options
RADIUS and TACACS+ Overview
RADIUS Authentication Process
TACACS+ Authentication Process
Configuring AAA
Configuring RADIUS for Console and VTY Access
Configuring TACACS+ for Console and VTY Access
AAA Authorization
AAA Accounting
Limitations of TACACS+ and RADIUS
Identify-based Networking
IEEE 802.1x Port-Based Authentication Overview
IEEE 802.1x Configuration Checklist
Network Time Protocols
The Need for Accurate Time
Configuring the System Clock Manually
Ch 7 Network
Management
Discovery Protocols
Introduction to LLDP
Basic configuration of LLDP
Discovery neighbors using LLDP
Unidirectional Link Detection (UDLD)
UDLD Mechanisms and Specifics
UDLD Configuration and Example
RSPAN Configuration
IP SLA
Introduction to IP SLA
IP SLA Source and Responder
IP SLA Configuration
IP SLA Operation with Responder
IP SLA Timestamps
Configuring Authentication for IP SLA
IP SLA Example For UDP Jitter
High Availability
The Need for Logical Switching Architectures
What is StackWise?
StackWise Benefits
Verifying StackWise
What is VSS?
VSS Benefits
Verifying VSS
Ch 9 High Availability
Ch 9 High Availability
Redundant Switch Supervisors
DHCP Snooping
DHCP Option 82
Ch 10 Campus Network
Security
DHCP Snooping Example Configuration
IP Source Guard
IP Source Guard Configuration
ARP Spoofing
Dynamic ARP Inspection
DIA Configuration
Securing VLAN Trunks
Switch Spoofing
VLAN Hopping
Protecting Against VLAN Hopping
VLAN Access Lists (VACLs)
VACL interaction with ACLs and PACLs
Configuring VACLs
Private VLANs
Introduction to Private VLANs
Private VLAN Port Types
Private VLAN Configuration
Private VLAN Verification
Private VLANs Across Multiple Switches
g the available draft chapters of the SWITCH Foundation Learning Guide (300-115), and may n
published
Location in Cert Guide
Topic Header
Ch2 "Switch Operation", Page 32, "Layer 2 Switch Operation"
Ch2 "Switch Operation", Pages 32-35, "Transparent Bridging"
Ch3 "Switch Port Configuration", Page 59, "Ethernet Overview"
Cert Guide does not detail MAC Address details; This is a CCNA-Level Task
Cert Guide does not detail IEEE 802.3 frame format details; This is a CCNA-Level Task
Ch2 "Switch Operation", Pages 32-35, "Transparent Bridging"
Basic Definition; Ch4 "VLANs and Trunks", Page 95, "Virtual LANs"
Basic Definition; Ch6 "Traditional Spanning Tree Protocol", Page 151 "IEEE 802.1D Overview"
Basic Definition;
Definition; Ch10
Ch4 "VLANs
and Trunks",
"VLAN Trunks"
Basic
"Aggregating
Switch Pages
Links", 101-103,
Pages 245-247,
"Switch Port Aggregation with
EtherChannel"
Basic Definition; Ch2 "Switch Operation", Page 36, "Multilayer Switch Operation"
Topic Header
Ch1 "Enterprise Campus Network Design", Pages 7-11 "Hierachical Network Design"
Ch1 "Enterprise Campus Network Design", Page 12 "Access Layer"
Ch1 "Enterprise Campus Network Design", Page 12 "Distribution Layer"
Ch1 "Enterprise Campus Network Design", Page 12 "Core Layer"
Ch1 "Enterprise Campus Network Design", Page 20 (Referencing Figure 1-15)
Ch1 "Enterprise Campus Network Design", Pages 13-24 "Modular Network Design"
Ch1
Core" in a Hierarchical Network
Ch1 "Enterprise
"Enterprise Campus
Campus Network
Network Design",
Design", Pages
Pages 20-24
24-26 "Network
"Cisco Products
Design"
Topic Header
Ch2 "Switch Operation", Pages, 32-36 "Layer 2 Switch Operation"
Ch2"Switch Operation", Pages 32-36, "Layer 2 Switch Operation"
Ch2 "Switch Operation", Pages 36-40, "Multilayer Switch Operation"
Ch2 "Switch Operation", Pages 45-48, "Managing Switching Tables"
Ch2"Switch Operation", Page 39, (In text starting with "During the multilayer")
Topic Header
Ch4 "VLANs and Trunks", Page 95, "Virtual LANs"
Ch4 "VLANs and Trunks", Pages 99-100, "Deploying VLANs"
Ch4 "VLANs and Trunks", Pages 100-101, "End-to-End VLANs"
Ch4 "VLANs and Trunks",Page 101, "Local VLANs"
Ch 9 "Advanced Spanning Tree Protocol", Page 229, "Topology Changes and RSTP"
Ch 7 "Spanning-Tree Configuration", Pages 181-184, "STP Root Bridge"
Ch 7 "Spanning-Tree Configuration", Pages 184-188, "Root Bridge Configuration"
Ch 7 "Spanning-Tree Configuration", Pages 188-191, "Spanning-Tree Customization"
Ch 7 "Spanning-Tree Configuration", Pages 191-194, "Tuning Spanning-Tree Convergence"
Topic Header
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 208-209, "BPDU Guard"
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 213-214, "Using BPDU Filtering to
Disable STP on a Port"
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 207-208, "Root Guard"
Ch 9 "Advanced Spanning Tree Protocol", Pages 234-236, "Spanning-Tree Instances Within MST"
Topic Header
Topic Header
Ch 11 "Multilayer Switch", Pages 280-284, "Verifying Multilayer Switching"
Ch 11 "Multilayer Switch", Page 272, (In text Starting with "Be aware that an SVI")
Topic Header
Ch 12 "Configuring DHCP", Pages 293-294, "Configuring an IPv4 DHCP Server"
Ch 12 "Configuring DHCP", Pages 296, "Configuring DHCP Relay"
Ch 12 "Configuring DHCP", Pages 296, "Configuring DHCP Options"
Ch 16: Using Port Mirroring to Monitor Traffic: "Using Port Mirrorring to Monitor Traffic", Page 349-362
Ch 16: Using Port Mirroring to Monitor Traffic, "Foundation Topics", Page 352-354, Remote SPAN,
Page 356
Ch 16: Using Port Mirroring to Monitor Traffic, "Local Span Configuration", Page 354
Ch 16: Using Port Mirroring to Monitor Traffic "Remote SPAN", Page 357
Ch 15: Monitoring Performance with IP SLA, Page 333-346
Ch 15: Monitoring Performance with IP SLA, "IP SLA Overview", Page 336
Ch 15: Monitoring Performance with IP SLA "IP SLA Overview", Page 337
Ch 15: Monitoring Performance with IP SLA, "Configuring IP SLA", Plage 338
Ch 15: Monitoring Performance with IP SLA, " Configuring IP SLA", Page 339
Ch 15: Monitoring Performance with IP SLA "Configuring IP SLA" , Plage 339
Ch 15: Monitoring Performance with IP SLA "Configuring IP SLA" , Plage 339
No specific example in Certification Guide
Ch 17: Understanding High Availability
Ch 17: Understanding High Availability, "Leveraging Logical Switches", Page 368
Ch 17: Understanding High Availability, "Stackwise", Page 371
Ch 17: Understanding High Availability, "Stackwise", Page 372
Not covered in the Certification Guide
Ch 17: Understanding High Availability, "Virtual Switching System", Page 372
Virtual Switching System, Page 372
Ch 17: Understanding High Availability, "Supervisor and Route Processor Redundancy" Page 373- 379
Ch 17: Understanding High Availability "Configuring the Redundancy Mode", Page 374
est Practices
Ch 19: Securing Switch Access, "Part VII: Securing Switched Networks", Page 411
Not covered in the Certification Guide
Not covered in the Certification Guide
Not covered in the Certification Guide
Ch 19: Securing Switch Access, "Port Security", Page 415
Ch 19: Securing Switch Access, "Port Security", Page 415 -416
Ch 3: Switch Port Configuration, "Managing Error Conditions on a Switch Port", Page 69-71
Ch 3: Switch Port Configuration, "Managing Error Conditions on a Switch Port", Page 71
Not covered in the Certification Guide
Ch 19: Securing Switch Access, "Using Storm Control", Page 421-423
Ch 19: Securing Switch Access, "Using Storm Control", Page 421-422
Ch 19: Securing Switch Access, "Using Storm Control", Page 423
Prevent Spoofing Attacks, Page 449-459
Not covered in the Certification Guide
Ch 21: Preventing Spoofing Attacks, "DHCP Snooping", Page 451
Ch 21: Preventing Spoofing Attacks, "DHCP Snooping", Page 452-453
-115), and may not be accurate with relation to the book when
Additional References and Notes
From *DRAFT* FLG Chapter:
If you have a very good understanding of switching terminology and a basic
comprehensive of switching technology, you may want to skip this chapter
and begin on Chapter 2.
"In summary, this chapter covers the following basic switching topics as a
review to CCNA and serves a teaser for topics covered later in chapter"
Timers":
http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-treeprotocol/19120-122.html
Configuring Optional Spanning-Tree Features: 3560 Software Configuration
Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swstpopt.html
Configuring Optional Spanning-Tree Features: 3560 Software Configuration
Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swstpopt.html
SWITCH Foundation Learning Guide (v6 - 642-813), Page 193, "Routed Port:
Advantages
Disadvantages"
This section and
is a step-by-step
walk through of configuring InterVLAN Routing
using SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages
197-199
This section is a step-by-step walk through of configuring InterVLAN Routing
using SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages
197-199
This section is a step-by-step walk through of configuring InterVLAN Routing
using SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages
197-199
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 199-200, "SVI
Autostate"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 197-198, "InterVLAN
Configuration
SVI: Implementation
Plan" Pages 204-206, "
SWITCH
Foundationwith
Learning
Guide (v6 - 642-813),
Troubleshooting Inter-VLAN Problems"
Configuring EtherChannels: 3560 Software Configuration Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swethchl.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 206-208,
"Configuration of Layer 3 EtherChannel"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 208-210,
"Routing Protocol Configuration" and "Verifying Routing Protocol"
chapter 12 "Configuring DHCP", pages 297-299, "Configuring DHCP to
support IPv6"
Also - Cisco Documentation - IOS IPv6 Configuration Guide for IOS release
15.2M&T
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/15SWITCH Foundation Learning Guide (v6 - 642-813), Pages 288 , Chapter 5:
Implementing High Availability and Redundancy in a Campus Network, "First
Hop Redunandcy Protocols
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 244- , Chapter 5
Implementing High Availability and Redundancy in a Campus Network"
Configuring GLBP
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15mt/fhp-15-mt-book/fhp-glbp.html
Configuring GLBP
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15mt/fhp-15-mt-book/fhp-glbp.html
Configuring GLBP
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15mt/fhp-15-mt-book/fhp-glbp.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 262-272,
Chapter 5: Implementing High Availability, " Implementing Network
Monitoring"
Verifying SNMPv3
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe3se/3850/snmp-xe-3se-3850-book/nm-snmp-snmpv3.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 373-376, "
Neighbor Discovery Protocols"
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/12-2_52_se/configuration/guide/3560scg/swudld.html
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/12-2_52_se/configuration/guide/3560scg/swipsla.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 368 "IP Spoofing
and IP Source Guard "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 361 "Arp
Spoofing Attack "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 362 "Arp
Spoofing Attack "