Implementing Cisco IP switched networks (SWITCH) : foundation learning guide / Richard Froom, Erum Frahim.
-
Froom, Richard (författare)
-
Frahim, Erum (författare)
- ISBN 9781587206641
- Publicerad: Indianapolis, IN : Cisco Press, 2015
- Engelska xxiv, 488 pages
Innehållsförteckning
Ämnesord
Stäng
- Machine generated contents note: Switching Introduction -- Hubs and Switches -- Bridges and Switches -- Switches of Today -- Broadcast Domains -- MAC Addresses -- The Basic Ethernet Frame Format -- Basic Switching Function -- VLANs -- The Spanning Tree Protocol -- Trunking -- Port Channels -- Multilayer Switching -- Summary -- Campus Network Structure -- Hierarchical Network Design -- Access Layer -- Distribution Layer -- Core Layer (Backbone) -- Layer 3 in the Access Layer -- The Cisco Enterprise Campus Architecture -- The Need for a Core Layer -- Types of Cisco Switches -- Comparing Layer 2 and Multilayer Switches -- MAC Address Forwarding -- Layer 2 Switch Operation -- Layer 3 (Multilayer) Switch Operation -- Useful Commands for Viewing and Editing Catalyst Switch MAC Address Tables -- Frame Rewrite -- Distributed Hardware Forwarding -- Cisco Switching Methods -- Route Caching -- Topology-Based Switching -- Hardware Forward Details -- Study Tips -- Summary --.
- Note continued: Review Questions -- Implementing VLANs and Trunks in Campus Environment -- VLAN Overview -- VLAN Segmentation -- End-to-End VLANs -- Local VLANs -- Comparison of End-to-End VLANs and Local VLANs -- Mapping VLANs to a Hierarchical Network -- Implementing a Trunk in a Campus Environment -- Understanding Native VLAN in 802.1Q Trunking -- Understanding DTP -- VLAN Ranges and Mappings -- Configuring, Verifying, and Troubleshooting VLANs and Trunks -- Verifying the VLAN Configuration -- Configuring VLANs and Trunks -- Best Practices for VLANs and Trunking -- Voice VLAN Overview -- Switch Configuration for Wireless Network Support -- VLAN Trunking Protocol -- VTP Overview -- VTP Modes -- VTP Versions -- VTP Pruning -- VTP Authentication -- VTP Advertisements -- VTP Messages Types -- Summary Advertisements -- Subset Advertisements -- Configuring and Verifying VTP -- Overwriting VTP Configuration (Very Common Issue with VTP) --.
- Note continued: Best Practices for VTP Implementation -- Implementing EtherChannel in a Switched Network -- The Need for EtherChannel -- EtherChannel Mode Interactions -- LACP -- PAgP -- Layer 2 EtherChannel Configuration Guidelines -- EtherChannel Load-Balancing Options -- Configuring EtherChannel in a Switched Network -- EtherChannel Configuration and Load Balancing -- EtherChannel Guard -- Study Tips -- Summary -- Review Questions -- Spanning Tree Protocol Overview -- STP Need -- STP Standards -- STP Operations -- Bridge Protocol Data Units -- Root Bridge Election -- Root Port Election -- Designated Port Election -- STP Port States -- Per-VLAN STP Plus (PVST+) -- STP Topology Changes -- Rapid Spanning Tree Protocol -- RSTP Port Roles -- Comparison of RSTP and STP Port States -- RSTP Topology Changes -- RSTP Link Types -- Configuring and Modifying STP Behavior -- Changing STP Priority -- STP Path Manipulation -- STP Timers -- Implementing STP Stability Mechanisms --.
- Note continued: Use UplinkFast -- Use BackboneFast -- Use PortFast -- Securing PortFast Interface with BPDU Guard -- Disabling STP with BPDU Filter -- Use Root Guard -- Loop Guard Overview -- Use UDLD -- UDLD Recommended Practices -- Use FlexLinks -- STP Stability Mechanisms Recommendations -- Configuring Multiple Spanning Tree Protocol -- Introducing MST -- MST Regions -- STP Instances with MST -- Extended System ID for MST -- Configuring and Verifying MST -- Configuring MST Path Cost -- Configuring MST Port Priority -- MST Protocol Migration -- MST Recommended Practices -- Troubleshooting STP -- Potential STP Problems -- Duplex Mismatch -- Unidirectional Link Failure -- Frame Corruption -- Resource Errors -- PortFast Configuration Errors -- Study Tips -- Summary -- Review Questions -- Describing Inter-VLAN Routing -- Introduction to Inter-VLAN Routing -- Inter-VLAN Routing Using an External Router -- Configuring Inter-VLAN Routing Using an External Router --.
- Note continued: Routing with an External Router -- External Routers: Advantages Disadvantages -- Inter-VLAN Routing Using Switch Virtual Interfaces -- SVI: Advantages and Disadvantages -- Routing with Routed Ports -- Routed Ports: Advantages -- Configuring Inter-VLAN Routing Using SVI and Routed Ports -- Routing on a Multilayer Switch -- Using the SVI autostate exclude Command -- SVI Configuration Checklist -- Troubleshooting Inter-VLAN Problems -- Example of a Troubleshooting Plan -- Layer 2 Versus Layer 3 EtherChannel -- Layer 3 EtherChannel Configuration -- Verifying Routing Protocols -- Implementing DHCP -- DHCP Overview -- Configuring DHCP in Multilayer Switched Network -- Configuring a DHCP Relay -- Configuring DHCP Options -- Study Tips -- Summary -- Review Questions -- Overview of FHRP and HSRP -- The Need for First-Hop Redundancy -- HSRP Overview -- HSRP State Transition -- Aligning HSRP with STP Topology -- Configuring and Tuning HSRP --.
- Note continued: Forwarding Through the Active Router -- Load Sharing with HSRP -- The Need for Interface Tracking with HSRP -- HSRP Interface Tracking -- HSRP and Object Tracking -- Configuring HSRP Authentication -- Tuning HSRP Timers -- HSRP Versions -- Configuring Layer 3 Redundancy with VRRP -- About VRRP -- Configuring VRRP and Spotting the Differences from HSRP -- VRRP and Authentication -- Tracking and VRRP -- Configuring Layer 3 Redundancy with GLBP -- Introducing GLBP -- Comparing GLPB to HSRP -- GLBP States -- Configuring and Verifying GLBP -- GLBP Load-Balancing Options -- GLBP Authentication -- GLBP and STP -- Tracking and GLBP -- Study Tips -- Summary -- References -- Review Questions -- AAA -- Authentication Options -- RADIUS and TACACS+ Overview -- RADIUS Authentication Process -- TACACS+ Authentication Process -- Configuring AAA -- Configuring RADIUS for Console and vty Access -- Configuring TACACS+ for Console and vty Access -- AAA Authorization --.
- Note continued: AAA Accounting -- Limitations of TACACS+ and RADIUS -- Identity-Based Networking -- IEEE 802.1X Port-Based Authentication Overview -- IEEE 802.1X Configuration Checklist -- Network Time Protocols -- The Need for Accurate Time -- Configuring the System Clock Manually -- Network Time Protocol Overview -- NTP Modes -- Other NTP Configuration Options -- NTP Example -- NTP Design Principles -- Securing NTP -- NTP Source Address -- NTP Versions -- SNTP -- PTP/IEEE-1588 -- SNMP -- SNMP Overview -- SNMP Versions -- SNMP Best Practices -- SNMPv3 Configuration Example -- Verifying SNMP Version 3 Configuration -- Study Tips -- Summary -- Review Questions -- Discovery Protocols -- Introduction to LLDP -- Basic Configuration of LLDP -- Discovering Neighbors Using LLDP -- Unidirectional Link Detection -- UDLD Mechanisms and Specifics -- UDLD Configuration -- Leveraging UDLD and STP Loop Guard Together -- Power over Ethernet -- PoE Components -- PoE Standards --.
- Note continued: PoE Negotiation -- Configuring and Verifying PoE -- SDM Templates -- SDM Template Types -- Choosing the Right SDM Template -- System Resource Configuration on Other Platforms -- Monitoring Features -- SPAN and RSPAN Overview -- SPAN Configuration -- RSPAN Configuration -- IP SLA -- Introduction to IP SLA -- IP SLA Source and Responder -- IP SLA Configuration -- IP SLA Operation with Responder -- IP SLA Time Stamps -- Configuring Authentication for IP SLA -- IP SLA Example for UDP Jitter -- Study Tips -- Summary -- Review Questions -- The Need for Logical Switching Architectures -- What Is StackWise? -- StackWise Benefits -- Verifying StackWise -- What Is VSS? -- VSS Benefits -- Verifying VSS -- Redundant Switch Supervisors -- Supervisor Redundancy Modes -- Stateful Switchover -- Nonstop Forwarding -- Study Tips -- Summary -- Review Questions -- References -- Overview of Switch Security Issues -- Cisco Switch Security Configuration Best Practices --.
- Note continued: Campus Network Vulnerabilities -- Rogue Access -- Switch Vulnerabilities -- MAC Flooding Attacks -- Introducing Port Security -- Port Security Configuration -- Port Error Conditions -- Err-Disabled Automatic Recovery -- Port Access Lists -- Storm Control -- Introduction to Storm Control -- Configuring and Verifying Storm Control on an Interface -- Mitigating Spoofing Attacks -- DHCP Spoofing Attacks -- DHCP Snooping -- DHCP Option 82 -- DHCP Snooping Example Configuration -- IP Source Guard -- IPSG Configuration -- ARP Spoofing -- Dynamic ARP Inspection -- DAI Configuration -- Securing VLAN Trunks -- Switch Spoofing -- VLAN Hopping -- Protecting Against VLAN Hopping -- VLAN Access Lists -- VACL Interaction with ACLs and PACLs -- Configuring VACLs -- Private VLANs -- Introduction to PVLANs -- PVLAN Port Types -- PVLAN Configuration -- PVLAN Verification -- PVLANs Across Multiple Switches -- Using the Protected Port Feature -- Study Tips -- Summary --.
Ämnesord
- Telecommunication -- Switching systems -- Examinations -- Study guides. (LCSH)
- Telecommunications engineers -- Certification -- Examinations -- Study guides. (LCSH)
Indexterm och SAB-rubrik
- Puc Datanät och datakommunikation
Klassifikation
- 621.38216 (DDC)
- Puc (kssb/8)
Inställningar
Hjälp
Titeln finns på 5 bibliotek.
Ange som favorit
-
Campusbiblioteket Skellefteå (Lat)Ange som favorit
-
Mina lånLåna/reservera
-
-
Placering: 620 Implementing Kurs
Utlånad?Öppettider, adress m.m.
Ange som favoritAnge som favoritAnge som favorit