Sunteți pe pagina 1din 30

Important Note: This content mapping was created using the available draft chap

Foundation Learning
Guide Chapter

Ch1 Fundamentals
Review

Foundation Learning Guide Topic Headers

Switching Introduction
Hubs and Swtiches
Bridges and Switches
Switches of Today
Broadcast Domains
MAC Addresses
The Basic Ethernet Frame Format
Basic Switching Function
VLANs
The Spanning Tree Protocol
Trunking
Port-Channels
MultiLayer Switching (MLS)

Campus Network Structure


Hierarchical Network Design
Access Layer
Distribution Layer
Core Layer
Layer 3 in the Access Layer
The Cisco Enterprise Campus Architecture
The need for a Core Layer

Ch2 Campus Network


Design Fundamentals

Types of Cisco Switches


Comparing Layer 2 and Multilayer Switches
MAC Address Forwarding
Layer 2 Switch Operation
Layer 3 Switch Operation
Useful commands for viewing and editing Catalyst switch MAC
address tables
Frame Rewrite
Distributed Hardware Forwarding
Cisco Switching Methods
Route Caching
Topology Based Switching

Hardware Forwarding Details

Implementing VLANs and Trunks in a Campus Environment


VLAN Overview
VLAN Segmentation
End-to-End VLANs
Local VLANs
Comparison of End-to-End VLANs and Local VLANs
Mapping VLANs to a hierarchical network
Implementing Trunks in a Campus Environment
Understanding Native VLAN in 802.1Q Trunking
Understanding DTP
Cisco Trunking Modes and Methods
VLAN Ranges and Mappings
VLAN Ranges
Configuring, Verifying, and Troubleshooting VLANs and Trunks
Verifying VLAN configuration

Configuring VLANs and Trunks

Ch3 Campus Network


Architecture

Best Practices for VLANs and Trunking


Voice VLAN overview
Switch configuration for wireless network support
VLAN Trunking Protocol
VTP Overview
VTP Modes
VTP Versions
VTP Pruning

VTP Authentication
VTP Advertisements
VTP Message types
Summary Advertisements
Subset Advertisements
Advertisement Requests

Configuring and verifying VTP


Overwriting VTP configuration

Best Practices for VTP implementation


Implementing EtherChannel in a Switched Network
The need for EtherChannel
EtherChannel Mode Interactions
LACP
PAgP
Layer 2 EtherChannel configuration guidelines
EtherChannel Load-Balancing options
Configuring EtherChannel in a switched network
EtherChannel configuration and Load-Balancing
EtherChannel Guard
Spanning Tree Protocol Overview
STP Overview
STP Operation
Bridge Protocol Data Unit (BPDU)
Root Bridge Election
Root port Election
Designated Port Election
STP Port States
Per-VLAN STP
STP Topology Changes
Rapid Spanning Tree Protocol
RSTP Port Roles
Comparison of RSTP and STP Port States
RSTP Topology Changes
RSTP LinkTypes
Configuring and Modifying STP Behavior
Changing STP Priority
STP Path Manipulation
STP Timers
Implementing STP Stability Mechanisms

UplinkFast

BackboneFast

PortFast

Securing PortFast Interface with BPDU Guard

Ch4 Spanning Tree


Implementation

Disabling STP with BPDU Filter

Root Guard

Loop Guard Overview

UDLD
UDLD Recommended Practices
FlexLinks
STP Stability Mechanisms Recommendations
Implementing Multiple Spanning Tree Protocol

Introducing Multiple Spanning Tree Protocol


MST Regions
STP Instances with MST
Extended System ID for MST

Configuring MST
Configuring MST Path Cost
Configuring MST Port Priority

MST Protocol Migration

MST Recommended Practice


Implementing Inter-VLAN Routing
Describing Inter-VLAN Routing
Introduction to Inter-VLAN Routing
Inter-VLAN Routing using an External Router Overview
Configuring InterVLAN Routing using an External Router
Routing with an External Router
External Router: Advantages and Disadvantages
Inter-VLAN Routing Using Switch Virtual Interfaces
SVI: Advantages and Disadvantages

Routing with Routed Ports


Routed Port: Advantage and Disadvantage
Ch5 InterVLAN Routing

Configuring InterVLAN Routing using SVI and Routed Ports


Overview
Routing on a Multilayer Switch
SVI autostate exclude
SVI Configuration Checklist
Troubleshooting Inter-VLAN Problems
Layer 2 vs. Layer 3 EtherChannel
Layer 3 EtherChannel configuration
Verifying Routing Protocol
Implementing DHCP
Configuring DHCP in Multilayer Switched network
DHCP Relay
DHCP Options

First Hop Redundancy Protocols


Introduction
Overview of FHRP and HSRP

Ch6 First Hop


Redundancy Protocols

The Need for First Hop Redundancy


HSRP State Transition
HSRP and STP
Configuring and Tuning HSRP
Forwarding Through Active Router
Load Sharing with HSRP
The Need for Interface Tracking with HSRP
HSRP Interface Tracking
HSRP and Object Tracking
HSRP Authentication
HSRP Timers
HSRP Versions
VRRP
Configuring Layer Redundancy with VRRP
About VRRP
Configure VRRP and Spot the Difference
VRRP and Authentication
Tracking and VRRP
Introducing GLBP
HSRP vs GLBP
GLBP States
GLBP Operation Explained
GLBP Load Balancing Options
GLBP Authentication
GLBP and STP
Tracking and GLBP

Network Management
AAA
Authenetication Options
RADIUS and TACACS+ Overview
RADIUS Authentication Process
TACACS+ Authentication Process
Configuring AAA
Configuring RADIUS for Console and VTY Access
Configuring TACACS+ for Console and VTY Access
AAA Authorization
AAA Accounting
Limitations of TACACS+ and RADIUS

Identify-based Networking
IEEE 802.1x Port-Based Authentication Overview
IEEE 802.1x Configuration Checklist
Network Time Protocols
The Need for Accurate Time
Configuring the System Clock Manually
Ch 7 Network
Management

Network Time Protocol Overview


NTP Modes
Other NTP Configuration Options
NTP Example
NTP Design Principles
Securing NTP
NTP Versions
NTP in IPv6 Topologies
SNTP Overview
PTP/IEEE-1588
SNMPv3
SNMP Overview
SNMP Versions
SNMP Best Practices
SNMPv3 Configuration Example
Verifying SNMP Version 3 Configuration

Discovery Protocols
Introduction to LLDP
Basic configuration of LLDP
Discovery neighbors using LLDP
Unidirectional Link Detection (UDLD)
UDLD Mechanisms and Specifics
UDLD Configuration and Example

Leveraging UDLD and STP LoopGuard Together

Power of Ethernet (POE)


PoE Components
PoE Standards
PoE Negotiation
Configuring and Verifying PoE
SDM Templates
Ch 8 Switching Features SDM Templates Types
and Technologies
Choosing the Right SDM Template
System Resource Configuration on Other Platforms

Monitoring Features (SPAN and RSPAN)


SPAN and RSPAN Overview
SPAN Configuration

RSPAN Configuration
IP SLA
Introduction to IP SLA
IP SLA Source and Responder
IP SLA Configuration
IP SLA Operation with Responder
IP SLA Timestamps
Configuring Authentication for IP SLA
IP SLA Example For UDP Jitter
High Availability
The Need for Logical Switching Architectures
What is StackWise?
StackWise Benefits
Verifying StackWise
What is VSS?
VSS Benefits
Verifying VSS

Ch 9 High Availability

Ch 9 High Availability
Redundant Switch Supervisors

Supervisor Redundancy Modes

Stateful Switchover (SSO)

Nonstop Forwarding (NSF)


Campus Network Security

Overview of Switch Security Issues


Cisco Switch Recommended Security Configuration Best Practices
Campus Network Vulnerabilities
Rogue Access
Switch Vulnerabilities
MAC Flooding Attack
Introducing Port Security
Port Security Configuration
Port Error Conditions
Error-Disabled Automatic Recovery
Port Access Lists
Storm Control
Introduction to Storm Control
Configuring Storm Control on an Interface
Mitigating Spoofing Attacks
DHCP Spoofing Attacks
Ch 10 Campus Network
Security

DHCP Snooping
DHCP Option 82

Ch 10 Campus Network
Security
DHCP Snooping Example Configuration
IP Source Guard
IP Source Guard Configuration
ARP Spoofing
Dynamic ARP Inspection
DIA Configuration
Securing VLAN Trunks
Switch Spoofing
VLAN Hopping
Protecting Against VLAN Hopping
VLAN Access Lists (VACLs)
VACL interaction with ACLs and PACLs
Configuring VACLs
Private VLANs
Introduction to Private VLANs
Private VLAN Port Types
Private VLAN Configuration
Private VLAN Verification
Private VLANs Across Multiple Switches

Protected Port Feature

g the available draft chapters of the SWITCH Foundation Learning Guide (300-115), and may n
published
Location in Cert Guide

Topic Header
Ch2 "Switch Operation", Page 32, "Layer 2 Switch Operation"
Ch2 "Switch Operation", Pages 32-35, "Transparent Bridging"
Ch3 "Switch Port Configuration", Page 59, "Ethernet Overview"
Cert Guide does not detail MAC Address details; This is a CCNA-Level Task
Cert Guide does not detail IEEE 802.3 frame format details; This is a CCNA-Level Task
Ch2 "Switch Operation", Pages 32-35, "Transparent Bridging"
Basic Definition; Ch4 "VLANs and Trunks", Page 95, "Virtual LANs"
Basic Definition; Ch6 "Traditional Spanning Tree Protocol", Page 151 "IEEE 802.1D Overview"
Basic Definition;
Definition; Ch10
Ch4 "VLANs
and Trunks",
"VLAN Trunks"
Basic
"Aggregating
Switch Pages
Links", 101-103,
Pages 245-247,
"Switch Port Aggregation with
EtherChannel"
Basic Definition; Ch2 "Switch Operation", Page 36, "Multilayer Switch Operation"

Topic Header
Ch1 "Enterprise Campus Network Design", Pages 7-11 "Hierachical Network Design"
Ch1 "Enterprise Campus Network Design", Page 12 "Access Layer"
Ch1 "Enterprise Campus Network Design", Page 12 "Distribution Layer"
Ch1 "Enterprise Campus Network Design", Page 12 "Core Layer"
Ch1 "Enterprise Campus Network Design", Page 20 (Referencing Figure 1-15)
Ch1 "Enterprise Campus Network Design", Pages 13-24 "Modular Network Design"
Ch1
Core" in a Hierarchical Network
Ch1 "Enterprise
"Enterprise Campus
Campus Network
Network Design",
Design", Pages
Pages 20-24
24-26 "Network
"Cisco Products
Design"
Topic Header
Ch2 "Switch Operation", Pages, 32-36 "Layer 2 Switch Operation"
Ch2"Switch Operation", Pages 32-36, "Layer 2 Switch Operation"
Ch2 "Switch Operation", Pages 36-40, "Multilayer Switch Operation"
Ch2 "Switch Operation", Pages 45-48, "Managing Switching Tables"
Ch2"Switch Operation", Page 39, (In text starting with "During the multilayer")

Ch2 "Switch Operation", Pages 36-39, "Types of Multilayer Switching"


Ch2"Switch Operation", Page 37, "Route Caching"
Ch2 "Switch Operation", Page 37, "Topology Based"

Topic Header
Ch4 "VLANs and Trunks", Page 95, "Virtual LANs"
Ch4 "VLANs and Trunks", Pages 99-100, "Deploying VLANs"
Ch4 "VLANs and Trunks", Pages 100-101, "End-to-End VLANs"
Ch4 "VLANs and Trunks",Page 101, "Local VLANs"

Ch4 "VLANs and Trunks", Pages 101-105, "VLAN Trunks"

Ch4 "VLANs and Trunks", Pages 96-98, "VLAN Membership"


Ch4 "VLANs and Trunks", Page 99, (Referencing Example 4-2)
Ch4 "VLANs and Trunks", Page 98, (In text starting with "Next, you should assign)
Ch4 "VLANs and Trunks", Pages 106-110, "VLAN Trunk Configuration"
Ch4 "VLANs and Trunks", Pages 110-112, "Troubleshooting VLANs and Trunks
"best practices" notes are embedded throughout the chapter
Ch4 "VLANs and Trunks", Pages 112-116, "Voice VLANs"
Ch4 "VLANs and Trunks", Pages 117-118, "Wireless VLANs"
Topic Header
Ch5 "VLAN Trunking Protocol" Page 127, "VLAN Trunking Protocol" and "VTP Domains"
Ch5 "VLAN Trunking Protocol" Pages 127-128, "VTP Modes"
Ch5 "VLAN Trunking Protocol" Pages 133-134, "Configuring the VTP Version"
Ch5 "VLAN Trunking Protocol" Pages 138-140, "VTP Pruning"

Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"


Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"
Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"
Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"
Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"

Ch5 "VLAN Trunking Protocol" Pages 132-138, "VTP Configuration"

"Best Practices" notes are embedded throughout the chapter


Topic Header
Ch10 "Aggregating Switch Links", Pages 245-247, "Switch Port Aggregation with EtherChannel"
Ch10 "Aggregating Switch Links", Page 251, "EtherChannel Negotiation Protocols"
Ch10 "Aggregating Switch Links", Page 252, "Link Aggregation Control Protocol"
Ch10 "Aggregating Switch Links", Page 252, "Port Aggregation Protocol"
Ch10 "Aggregating Switch Links", Pages 247-249, "Distributing Traffic in EtherChannel"
Topic Header
Ch10 "Aggregating Switch Links", Pages 253-255, "EtherChannel Configuration"
Ch10 "Aggregating Switch Links", Pages 249-251, "Configure EtherChannel Load Balancing"
Ch10 "Aggregating Switch Links", Pages 255-257, "Avoiding Misconfiguration with EtherChannel Guard"
Topic Header
Topic Header
Ch 6 "Traditional Spanning Tree Protocol", pages 155-156, "Spanning-Tree Communication: Bridge
Protocol Data Units"
Ch 6 "Traditional Spanning Tree Protocol", pages 156-158, "Electing a Root Bridge"
Ch 6 "Traditional Spanning Tree Protocol", pages 158-160, "Electing a Root Port"
Ch 6 "Traditional Spanning Tree Protocol", pages 160-162, "Electing Designated Ports"
Ch 6 "Traditional Spanning Tree Protocol", pages 162-165, "STP States"
Ch 6 "Traditional Spanning Tree Protocol", pages 172-174, "Types of STP"
Ch 6 "Traditional Spanning Tree Protocol", pages 167-172, "Topology Changes"
Ch 9 "Advanced Spanning Tree Protocol", Page 223, "Rapid Spanning Tree Protocol"
Ch 9 "Advanced Spanning Tree Protocol", Page 224 (In text Starting with "The root bridge in a
network")

Ch 9 "Advanced Spanning Tree Protocol", Page 229, "Topology Changes and RSTP"
Ch 7 "Spanning-Tree Configuration", Pages 181-184, "STP Root Bridge"
Ch 7 "Spanning-Tree Configuration", Pages 184-188, "Root Bridge Configuration"
Ch 7 "Spanning-Tree Configuration", Pages 188-191, "Spanning-Tree Customization"
Ch 7 "Spanning-Tree Configuration", Pages 191-194, "Tuning Spanning-Tree Convergence"
Topic Header

Ch 7 "Spanning-Tree Configuration", Pages 196-197, "UplinkFast: Access Layer Uplinks"

Ch 7 "Spanning-Tree Configuration", Pages 197-198, "BackboneFast: Redundant Backbone Paths"

Ch 7 "Spanning-Tree Configuration", Pages 194-196, "PortFast: Access Layer Nodes"

Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 208-209, "BPDU Guard"
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 213-214, "Using BPDU Filtering to
Disable STP on a Port"

Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 207-208, "Root Guard"

Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages210-211, "Loop Guard"

Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 211-213, "UDLD"

(Not mentioned in Cert Guide)

Ch 9 "Advanced Spanning Tree Protocol", Pages 234-236, "Spanning-Tree Instances Within MST"

(Not mentioned in Cert Guide)

(Not mentioned in Cert Guide)


Topic Header
Topic Header
Ch 11 "Multilayer Switching", Page 268, "InterVLAN Routing"
Cert Guide does not detail InterVLAN Routing using an External Router; This is a CCNA-Level Task
Cert Guide does not detail InterVLAN Routing using an External Router; This is a CCNA-Level Task
Cert Guide does not detail InterVLAN Routing using an External Router; This is a CCNA-Level Task
Cert Guide does not detail InterVLAN Routing using an External Router; This is a CCNA-Level Task
Ch 11 "Multilayer Switching", Page 269-270, " Configuring InterVLAN Routing"

Ch 11 "Multilayer Switching", Pages 268-269, "Types of Interfaces"


Ch 11 "Multilayer Switching", Pages 270-272, (In text starting with "Layer 2 Port Configuration")

Topic Header
Topic Header
Ch 11 "Multilayer Switch", Pages 280-284, "Verifying Multilayer Switching"
Ch 11 "Multilayer Switch", Page 272, (In text Starting with "Be aware that an SVI")

(L3 EtherChannel not mentioned)

Topic Header
Ch 12 "Configuring DHCP", Pages 293-294, "Configuring an IPv4 DHCP Server"
Ch 12 "Configuring DHCP", Pages 296, "Configuring DHCP Relay"
Ch 12 "Configuring DHCP", Pages 296, "Configuring DHCP Options"

Topic Header in Certification Guide


Ch 13, Layer 3 High Availability, "Hot Standby Router Protocol", Page 385

Ch 13, Layer 3 High Availability, "HSRP Router Election", Page 386


Ch 13, Layer 3 High Availability,"HSRP Gateway Addressing" , Page 390
Ch 13, Layer 3 High Availability,"Load Balancing with HSRP", Page 391
Ch 13, Layer 3 High Availability,"Conceding the Election", Page 389
Ch 13, Layer 3 High Availability,Conceding the Election, Page 389
Not13,
covered
Guide Text Authentication", Page 388 ," MD5 Authentication", Page
Ch
Layerin3 the
HighCertification
Availability,"Plain
388,
Not covered in the Certification Guide
Not covered in the Certification Guide
Ch 13, Layer 3 High Availability,"VRRP", Pages 394 -396
Ch 13, Layer 3 High Availability,"VRRP", Page 394
Not covered in the Certification Guide
Ch 13, Layer 3 High Availability,"VRRP", Page 394
Not covered in the Certification Guide
Not covered in the Certification Guide
Ch 13, Layer 3 High Availability,"GLBP", Page 397
Not covered in the Certification Guide
Ch13, Layer 3 High Availability,"Active Virtual Gateway", P age 397
Ch
13, Layer
3 High
Availability,"Active
Virtual
Forwarder",
Page
398 400
Chapter
13, Layer
3 High
Availability,"GLBP
Load
Balancing"
, Page
Not covered in the Certification Guide
Not covered in the Certification Guide
Not covered in the Certification Guide

Ch 19, Securing Switch Access, "AAA", Page 464


Ch 19, Securing Switch Access,TACACS+ and RADIUS, Page 464
Ch 19, Securing Switch Access,TACACS+ and RADIUS, Page 464
Ch 19, Securing Switch Access,TACACS+ and RADIUS, Page 464
Ch 19, Securing Switch Access,Configuring Authentication, Page 465-471
Ch 19, Securing Switch Access,Configuring Authentication, Page 467

Not addressed in FLG version 7.0

Ch 19, Securing Switch Access,Port Based Auentication, Page 418


Ch 19, Securing Switch Access,802.1x Configuration, Page 419 -421
Ch 13, Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source, Page 313
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 313
Ch 13, "Logging Switch Activity: Setting the Internal System Clock", page 312
Ch13,"Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 313
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 314
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 314
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 315,
Example 13-1 and 13-2
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 314,
Figure 13-3 addresses NTP Hierarchy
Ch 13, "Logging Switch Activity:Securing NTP", Page 316
Ch 13, "Logging Switch Activity", "Using NTP to Synchronize with an External Time Source", Page 313
Not covered in the Certification Guide
Ch 13, "Logging Switch Activity:Using SNTP to Synchronize Time", Page 316
Not covered in the Certification Guide
Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 324
Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 324
Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 325
Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 325
Cha 14: Managing Switches with SNMP,Configuring SNMPv3, Page 328
Not covered in the Certification Guide

Ch 3: Switch Port Configuration


Ch 3: Switch Port Configuration, "Link Layer Discover Protocol", Page 75
Ch 3: Switch Port Configuration, "Link Layer Discover Protocol", Page 75-76
Ch 3: Switch Port Configuration, "Link Layer Discover Protocol", Page 75-76
Ch 8: Protecting the Spanning-Tree Topology, "UDLD", Page 211
Ch 8: Protecting the Spanning-Tree Topology, "UDLD", Page 211
Ch 8: Protecting the Spanning-Tree Topology, "UDLD", Page 211

Ch 8: Protecting the Spanning-Tree Topology, UDLD, Page 216


Ch 3: Switch Port Configuration, "Using Power over Ethernet", Page 77
Ch 3: Switch Port Configuration,
Ch 3: Switch Port Configuration,How PoE Works, Page 78
Ch 3: Switch Port Configuration,Detecting a Powered Device, Page 79
Ch 3: Switch Port Configuration,Configuring PoE, Page 80
Verifying PoE, Page 81
Ch 2: Switch Operation, "Managing Switching Table Sizes", Page 49
Ch 2: Switch Operation, "Managing Switching Table Sizes", Page 50-51
Ch 2: Switch Operation,
Not covered in the Certification Guide

Ch 16: Using Port Mirroring to Monitor Traffic: "Using Port Mirrorring to Monitor Traffic", Page 349-362
Ch 16: Using Port Mirroring to Monitor Traffic, "Foundation Topics", Page 352-354, Remote SPAN,
Page 356
Ch 16: Using Port Mirroring to Monitor Traffic, "Local Span Configuration", Page 354

Ch 16: Using Port Mirroring to Monitor Traffic "Remote SPAN", Page 357
Ch 15: Monitoring Performance with IP SLA, Page 333-346
Ch 15: Monitoring Performance with IP SLA, "IP SLA Overview", Page 336
Ch 15: Monitoring Performance with IP SLA "IP SLA Overview", Page 337
Ch 15: Monitoring Performance with IP SLA, "Configuring IP SLA", Plage 338
Ch 15: Monitoring Performance with IP SLA, " Configuring IP SLA", Page 339
Ch 15: Monitoring Performance with IP SLA "Configuring IP SLA" , Plage 339
Ch 15: Monitoring Performance with IP SLA "Configuring IP SLA" , Plage 339
No specific example in Certification Guide
Ch 17: Understanding High Availability
Ch 17: Understanding High Availability, "Leveraging Logical Switches", Page 368
Ch 17: Understanding High Availability, "Stackwise", Page 371
Ch 17: Understanding High Availability, "Stackwise", Page 372
Not covered in the Certification Guide
Ch 17: Understanding High Availability, "Virtual Switching System", Page 372
Virtual Switching System, Page 372

Not covered in the Certification Guide

Ch 17: Understanding High Availability, "Supervisor and Route Processor Redundancy" Page 373- 379

Ch 17: Understanding High Availability "Configuring the Redundancy Mode", Page 374

Ch 17: Understanding High Availability, "Redundant Switch Supervisors", Page 373

Ch 17: Understanding High Availability,"Nonstop Forwarding", Page 377

est Practices
Ch 19: Securing Switch Access, "Part VII: Securing Switched Networks", Page 411
Not covered in the Certification Guide
Not covered in the Certification Guide
Not covered in the Certification Guide
Ch 19: Securing Switch Access, "Port Security", Page 415
Ch 19: Securing Switch Access, "Port Security", Page 415 -416
Ch 3: Switch Port Configuration, "Managing Error Conditions on a Switch Port", Page 69-71
Ch 3: Switch Port Configuration, "Managing Error Conditions on a Switch Port", Page 71
Not covered in the Certification Guide
Ch 19: Securing Switch Access, "Using Storm Control", Page 421-423
Ch 19: Securing Switch Access, "Using Storm Control", Page 421-422
Ch 19: Securing Switch Access, "Using Storm Control", Page 423
Prevent Spoofing Attacks, Page 449-459
Not covered in the Certification Guide
Ch 21: Preventing Spoofing Attacks, "DHCP Snooping", Page 451
Ch 21: Preventing Spoofing Attacks, "DHCP Snooping", Page 452-453

Ch 21: Preventing Spoofing Attacks, "DHCP Snooping" Page 452-453


Ch 21: Preventing Spoofing Attacks, "IP Source Guard", Page 453-455
Ch 21: Preventing Spoofing Attacks, "IP Source Guard", Page 454-455
Ch 21: Preventing Spoofing Attacks, "Dynamic Arp Inspection", Page 455
Ch 21: Preventing Spoofing Attacks, "Dynamic Arp Inspection", Page 455
Ch 21: Preventing Spoofing Attacks, "Dynamic Arp Inspection", Page 456-457
Ch 20: Securing VLANs Page 431-448
Ch 20: Securing VLANs, "Switching Spoofing", Page 441
Ch 20: Securing VLANs, "VLAN Hopping", Page 443
Not covered in the Certification Guide
Ch 20: Securing VLANs "VLAN Access Lists", Page 435
Not covered in the Certification Guide
Ch 20: Securing VLANs "VLAN Access Lists", Page 436
Ch 20: Securing VLANs, Page 436-441
Ch 20: Securing VLANs "Private VLANs", Page 436-437
Ch 20: Securing VLANs "Private VLANs", Page 436-437
Ch 20: Securing VLANs, "Private VLAN Configuration", Page 438 -441, Configuration Example 20-2
Not covered in the Certification Guide
Not covered in the Certification Guide

Not covered in the Certification Guide

-115), and may not be accurate with relation to the book when
Additional References and Notes
From *DRAFT* FLG Chapter:
If you have a very good understanding of switching terminology and a basic
comprehensive of switching technology, you may want to skip this chapter
and begin on Chapter 2.
"In summary, this chapter covers the following basic switching topics as a
review to CCNA and serves a teaser for topics covered later in chapter"

Also see Cisco Validated Designs: Campus Design Summary:


http://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2014/CampusD
esignSummary-AUG14.pdf
and Campus Wired LAN Design Guide:
http://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2014/CVDCampusWiredLANDesignGuide-AUG14.pdf

SWITCH Foundation Learning Guide (v6 - 642-813), Pages 216-217,


"Explaining
Layer 3 Switch
Processing"
SWITCH
Foundation
Learning
Guide (v6 - 642-813), Pages 220-221,
"Distributed
Hardware
Forwarding"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 222-225,
(Starting at "This section discusses the multilayer switching forwarding
methods")

SWITCH Foundation Learning Guide (v6 - 642-813), Pages 224-225, ("CEF


can
at following
twolimited
different
locations
theuse
switch:")
Note:occur
*DRAFT*
FLG has
coverage
of on
CEF;
SWITCH FLG v6
Pages 215-237 and/or Cert Guide Chapter 11 Pages 272-280 for full
coverage

SWITCH Foundation Learning Guide (v6 - 642-813), Pages 56-57,


"Comparison
of End-to-End
andGuide
Local(v6
VLANs"
SWITCH
Foundation
Learning
- 642-813), Pages 57-58, "Mapping
VLANs to a Hierarchical Network"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 71-72,
"Understanding
NativeLearning
VLAN inGuide
802.1Q
SWITCH Foundation
(v6trunking"
- 642-813), Pages 72-73,
"Understanding
DTP" Learning Guide (v6 - 642-813), Pages 72-73,
SWITCH
Foundation
"Understanding DTP"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 61, "VLAN
Ranges"
Covers Add/Change/Delete of VLANs switchport host command

Assignment of a port to a VLAN, Verifying VLAN database contents and port


assignments, Configuring a Trunk.
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 59-60, "Best
Practices for VLAN design" and Pages 73-74 "Best Practices for Trunking"

SWITCH Foundation Learning Guide (v6 - 642-813), Page 84, "VTP


Authentication"
VTPv1 & 2 Password Configuration: 3560 Software Configuration Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swvtp.html#wp1035165
VTPv3 Password Configuration: 3560 Software Configuration Guide
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swvtp.html#wp1312545

VTPv3: 3560 Software Configuration Guide:


http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swvtp.html
VTPv3: Catalyst 6500 Series Switches:
http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500series-switches/solution_guide_c78_508010.html

SWITCH Foundation Learning Guide (v6 - 642-813), Page 84, "Best


Practices for VTP Implementation"

SWITCH Foundation Learning Guide (v6 - 642-813), Pages 105-106,


"Configure Port Channels using EtherChannel"

SWITCH Foundation Learning Guide (v6 - 642-813), Pages 122-123, "STP


Operation"

Note: *DRAFT* FLG uses same introduction paragraph as SWITCH


Foundation Learning Guide (v6 - 642-813), Pages 125-126, "Rapid Spanning
Note:
*DRAFT* FLG paragraph highlights the PVST+ fields Bridge Priority,
Tree Protocol"
Extended
System ID,"Understanding
and MAC Address
Also see Cisco.Com
Rapid Spanning Tree Protocol":
http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-treeprotocol/24062-146.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 127-128, "RSTP
Port Roles"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 129, Table 3-5,
"802.1D and 802.1w Port Type and Port State Comparison"
Note: Cert Guide provides very good coverage of RSTP Convergence
between
225-229.
This information
not present
in the
*DRAFT*
FLG
SWITCH pages
Foundation
Learning
Guide (v6 - is642-813),
Pages
129-130,
"Rapid
Transition to Forwarding"

Timers":
http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-treeprotocol/19120-122.html
Configuring Optional Spanning-Tree Features: 3560 Software Configuration
Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swstpopt.html
Configuring Optional Spanning-Tree Features: 3560 Software Configuration
Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swstpopt.html

Configuring Optional Spanning-Tree Features: 3560 Software Configuration


Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swstpopt.html
Configuring Optional Spanning-Tree Features: 3560 Software Configuration
Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swstpopt.html
Configuring Optional Spanning-Tree Features: 3560 Software Configuration
Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swstpopt.html
Configuring Optional Spanning-Tree Features: 3560 Software Configuration
Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swstpopt.html
Configuring Optional Spanning-Tree Features: 3560 Software Configuration
Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swstpopt.html
Configuring UDLD: 3560 Software Configuration Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swudld.html
See Cisco.Com "Best Practices for UniDirectional Link Detection (UDLD)":
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/122SX/best/practices/recommendations.html#wp1050563
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 166-167, "Flex
Links"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 168-171,
"Recommended
Spanning
TreeGuide
Practices"
SWITCH
Foundation
Learning
(v6 - 6642-813), Page 141, "Multiple
Spanning Tree" (First paragraph)
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 141-143,
"Multiple Spanning Tree"
Also see Cisco.Com "Understanding Multiple Spanning Tree Protocol":
http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-treeprotocol/24248-147.html
SWITCH Foundation Learning Guide (v6 - 642-842), Pages 143-144, "MST
Regions"
SWITCH Foundation Learning Guide (v6 - 642-842), Page 144, "Extended
System IDFoundation
for MST" Learning Guide (v6 - 642-842), Page 145-150,
SWITCH
"Configuring MST"
Configuring MSTP: 3560 Software Configuration Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swmstp.html
Also see Cisco.Com "VTPv3 and MST: Catalyst 6500 Series Switches":
http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500Configuring MSTP: Configuring Path Cost: 3560 Software Configuration
series-switches/solution_guide_c78_508010.html
Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swmstp.html#wp1039394
Configuring MSTP: Configuring Port Priority: 3560 Software Configuration
Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
See
Cisco.Com "Configuration example to migrate Spanning Tree from
ase/15-0_2_se/configuration/guide/scg3560/swmstp.html#wp1039280
PVST+
to MST":
http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-seriesswitches/72844-MST.html
Also see Cisco.Com "Understanding Multiple Spanning Tree Protocol":
http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-treeprotocol/24248-147.html

Cisco.Com "Understanding Multiple Spanning Tree Protocol":


http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-treeprotocol/24248-147.html

SWITCH Foundation Learning Guide (v6 - 642-813), Pages 195-197,


"Inter_VLAN Configuration with External Router"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 186-189, "InterVLAN Routing Using an External Router (Router-on-a-Stick)"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 189-190,
"External Router: Advantages and Disadvantages"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 190-192, "InterVLAN Routing
Using Switch
Virtual
Interfaces"
SWITCH
Foundation
Learning
Guide
(v6 - 642-813), Page 192, "SVI:
Advantages and Disadvantages"

SWITCH Foundation Learning Guide (v6 - 642-813), Page 193, "Routed Port:
Advantages
Disadvantages"
This section and
is a step-by-step
walk through of configuring InterVLAN Routing
using SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages
197-199
This section is a step-by-step walk through of configuring InterVLAN Routing
using SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages
197-199
This section is a step-by-step walk through of configuring InterVLAN Routing
using SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages
197-199
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 199-200, "SVI
Autostate"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 197-198, "InterVLAN
Configuration
SVI: Implementation
Plan" Pages 204-206, "
SWITCH
Foundationwith
Learning
Guide (v6 - 642-813),
Troubleshooting Inter-VLAN Problems"
Configuring EtherChannels: 3560 Software Configuration Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/15-0_2_se/configuration/guide/scg3560/swethchl.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 206-208,
"Configuration of Layer 3 EtherChannel"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 208-210,
"Routing Protocol Configuration" and "Verifying Routing Protocol"
chapter 12 "Configuring DHCP", pages 297-299, "Configuring DHCP to
support IPv6"
Also - Cisco Documentation - IOS IPv6 Configuration Guide for IOS release
15.2M&T
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/15SWITCH Foundation Learning Guide (v6 - 642-813), Pages 288 , Chapter 5:
Implementing High Availability and Redundancy in a Campus Network, "First
Hop Redunandcy Protocols
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 244- , Chapter 5
Implementing High Availability and Redundancy in a Campus Network"

SWITCH Foundation Learning Guide (v6 - 642-813), Page 296, "HSRP


Active
Router
and Spanning
Tree
Topology"
SWITCH
Foundation
Learning
Guide
(v6 - 642-813), Page 296, "Configuring
HSRP"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 296, "Configuring
HSRP"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 302-304 "HSRP
Interface
Object
Tracking,
HSRP and
IP SLA
Tracking"
SWITCH Tracking,
FoundationHSRP
Learning
Guide
(v6 - 642-813),
Pages
302-304
"HSRP
Interface
Tracking,
HSRP
Object
Tracking,
HSRP
and
IP
SLA
Tracking"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 302-304 "HSRP
Interface Tracking,
Object
Tracking,
HSRP and
IP SLA
SWITCH
FoundationHSRP
Learning
Guide
(v6 - 642-813),
Page
298,Tracking"
"HSRP
Authentication"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 299-301, "HSRP
Timers
Considerations
and Configuration"
SWITCH
Foundation Learning
Guide (v6 - 642-813), Page 301, "HSRP
Versions"
SWITCH Foundation
Foundation Learning
Learning Guide
Guide (v6
(v6 -- 642-813),
642-813), Pages
Page 309-310,"VRRP"
SWITCH
312-315, "
Configure VRRP"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 309-310,"VRRP"
VRRP Authentication
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/124/fhp-12-4-book/fhp-vrrp.html
VRRP Tracking
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/124/fhp-12-4-book/fhp-vrrp.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 316, "Table 5-11,
Comparison between HSRP and GLBP"

Configuring GLBP
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15mt/fhp-15-mt-book/fhp-glbp.html
Configuring GLBP
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15mt/fhp-15-mt-book/fhp-glbp.html
Configuring GLBP
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15mt/fhp-15-mt-book/fhp-glbp.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 262-272,
Chapter 5: Implementing High Availability, " Implementing Network
Monitoring"

Compare RADUIS and TACACS+


http://www.cisco.com/c/en/us/support/docs/security-vpn/remoteauthentication-dial-user-service-radius/13838-10.html

SWITCH Foundation Learning Guide (v6 - 642-813), Pages 387-390, "


Security Using IEEE 802.1x Port-Based Authentication"

Not covered in detail in CCNP:SWITCH v.6.0

"What's new in Version 4"


http://www.ntp.org/ntpfaq/NTP-s-def.htm#Q-DEF-OV-V4NEWS
Implementing NTPv4 in IPv6
http://www.cisco.com/c/en/us/td/docs/ios/ipv6/configuration/guide/12_4t/ipv6_
12_4t_book/ip6-ntpv4.html
IEEE Standard for A Precison Clock Synchronization Protocol
http://www.nist.gov/el/isd/ieee/ieee1588.cfm
Securing Simple Network Management Protocol, Document ID: 20370,
www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080
094489.shtml

Verifying SNMPv3
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe3se/3850/snmp-xe-3se-3850-book/nm-snmp-snmpv3.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 373-376, "
Neighbor Discovery Protocols"

http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/12-2_52_se/configuration/guide/3560scg/swudld.html

LoopGuard versus UDLD


http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-treeprotocol/10596-84.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 491-493, "Power
over Ethernet"

Not covered in CCNP:SWITCH v.6.0

Consult www.cisco.com product configuration guide for guidance on SDM


Configuration for a specific platform.
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 398-410,
Chapter 6: Securing the Campus Infrastructure " Troubleshooting
Performance and Connectivity"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 402, Chapter 6:
Securing the Campus Infrastructure "Monitoring Performance with SPAN and
VSPAN "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 404-408,
Chapter
Securing the
Campus
Infrastructure
"Monitoring
SWITCH6:Foundation
Learning
Guide
(v6 - 642-813),
PagesPerformance
273-280 ,
RSPAN
"
Chapter 5: Implementing High Availability and Redundancy in a Campus
Network "IP SLA"

http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/12-2_52_se/configuration/guide/3560scg/swipsla.html

SWITCH Foundation Learning Guide (v6 - 642-813), Pages 259-260 ,


Chapter 5: Implmenting High Availability, "StackWise Access Switches"

Not covered in CCNP:SWITCH v.6.0


http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/15-12/XE_340/configuration/guide/config/vss.html#wp1060337
http://www.cisco.com/c/dam/en/us/products/collateral/interfacesmodules/network-modules/white_paper_c11_429338.pdf

SWITCH Foundation Learning Guide (v6 - 642-813), Pages280 , Chapter 5:


Implementing High Availability and Redundancy in a Campus Network
"Implementing Redundant Supervisor Engines in Catalyst Switches"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 281 , Chapter 5:
Implementing High Availability and Redundancy in a Campus Network,
"Route Process Redundancy"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 284 , Chapter 5:
Implementing High Availability and Redundancy in a Campus Network,
"Stateful Switchover (SSO)"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 284 , Chapter 5:
Implementing High Availability and Redundancy in a Campus Network,
"Stateful Switchover (SSO)"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 333-416
,Chapter 6: Securing the Campus Infrastructure
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 333-416
,Chapter 6: Securing the Campus Infrastructure " Switch Security
Fundamentals"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 390-397 ,
"Switch Security Considerations. "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 336
"Unauthorized Access by Rogue Devices"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 362 "Table 6-1
Switch Security Attacks and Mitigation Steps"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 338
"Understanding and Protecting Against MAC Layer Attack"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 341 "Port
Security"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 343 "Port
Security"

SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352 "VLAN


Access
Control
Configuring
PortLists"
Based Traffic Control:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/rele
ase/12-2_52_se/configuration/guide/3560scg/swtrafc.html

SWITCH Foundation Learning Guide (v6 - 642-813), Pages 356 "DHCP


Spoofing Attack"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 358 "DHCP
Snooping "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 359 "DHCP
Snooping "

SWITCH Foundation Learning Guide (v6 - 642-813), Pages 368 "IP Spoofing
and IP Source Guard "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 361 "Arp
Spoofing Attack "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 362 "Arp
Spoofing Attack "

SWITCH Foundation Learning Guide (v6 - 642-813), Pages 350 "VLAN


Hopping "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 351-352
"Mitigating Against VLAN Hopping"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352 "VLAN
Access Control Lists"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352-355 "VLAN
Access Control Lists"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352-355 "VLAN
Access Control Lists"
SWITCH Foundation Learning Guide (v6 - 642-813), Chapter 2:
Implementing VLANs in Campus Networks, Page 87-97, "Private VLANs"

SWITCH Foundation Learning Guide (v6 - 642-813), Chapter 2:


Implementing VLANs in Campus Networks, Page 121, "Port Protected
Feature"

S-ar putea să vă placă și