| Chapter
Review |
|
| Chapter
Overview |
|
| 5.1 |
Basic STP Operations
| 5.1.1 |
Usefulness of STP |
| 5.1.2 |
Broadcast
loops |
| 5.1.3 |
Bridge-table
corruption |
| 5.1.4 |
Bridge
identification |
| 5.1.5 |
Path cost |
| 5.1.6 |
Four-step STP
decision sequence |
|
|
| 5.2 |
STP Processes
| 5.2.1 |
Three steps
of initial STP convergence |
| 5.2.2 |
Root-bridge
elections |
| 5.2.3 |
Electing root
ports |
| 5.2.4 |
Electing
designated ports |
| 5.2.5 |
Spanning-Tree
port states |
| 5.2.6 |
STP timers |
| 5.2.7 |
Topology
changes and STP |
| 5.2.8 |
Spanning-Tree
example |
| 5.2.9 |
Enabling and
verifying Spanning Tree |
|
|
| 5.3 |
VLANs and STP
| 5.3.1 |
Per-VLAN STP |
| 5.3.2 |
Common STP |
| 5.3.3 |
Per-VLAN
Spanning Tree plus (PVST+) |
|
|
| 5.4 |
STP in the Campus Network
| 5.4.1 |
Establishing
a root bridge |
| 5.4.2 |
Determining
the best loop-free path to the root bridge |
| 5.4.3 |
Configure the
port cost |
| 5.4.4 |
Modifying
port priority |
| 5.4.5 |
Modifying
port priority by VLAN |
| 5.4.6 |
Modifying STP
timers |
|
|
| 5.5 |
Redundant Links
| 5.5.1 |
EtherChannel
technology |
| 5.5.2 |
Port
aggregation protocol |
| 5.5.3 |
EtherChannel
rules of the road |
| 5.5.4 |
Configuring
fast EtherChannel |
| 5.5.5 |
Configuring
PortFast |
| 5.5.6 |
Configuring
UplinkFast |
| 5.5.7 |
Configuring
BackboneFast |
|
|
| Chapter
Summary |
| Chapter
Quiz |
|
|
| Chapter 6:
Routing between VLANs |
| Chapter
Review |
| Chapter
Overview |
| 6.1 |
VLAN Issues
| 6.1.1 |
Importance
of routing |
| 6.1.2 |
Inter-VLAN
issues and solutions |
| 6.1.3 |
Isolated
broadcast domains |
| 6.1.4 |
Finding
the route between VLANs |
| 6.1.5 |
Supporting
multiple VLAN traffic |
| 6.1.6 |
Distribution-layer
topology |
| 6.1.7 |
External
routers |
| 6.1.8 |
Internal
route processors (RSM) |
|
|
| 6.2 |
Route Switch Modules
| 6.2.1 |
Configuring
iInter-VLAN routing |
| 6.2.2 |
Accessing
the RSM |
| 6.2.3 |
Configure
a routing protocol on the RSM |
| 6.2.4 |
Configure
RSM interfaces |
| 6.2.5 |
Configure
a default gateway on the switch |
|
|
| 6.3 |
External Routers
| 6.3.1 |
Configuring
external routers |
| 6.3.2 |
Router
on a stick |
| 6.3.3 |
Trunk-connected
routers |
| 6.3.4 |
When to
use the router-on-a-stick design |
| 6.3.5 |
Configuration example |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter 7:
Multilayer Switching |
Chapter
Review
|
|
Chapter
Overview
|
|
| 7.1 |
MLS Processes
| 7.1.1 |
MLS
overview |
| 7.1.2 |
MLS
hardware and software requirements |
| 7.1.3 |
MLS
operations |
| 7.1.4 |
Step
1: MLS hello packets are sent by the MLS-RP |
| 7.1.5 |
Step
2: The MLS-SE identifies candidate packets |
| 7.1.6 |
Step
3: The MLS-SE identifies enable packets |
| 7.1.7 |
Step
4: The MLS-SE shortcuts future packets |
| 7.1.8 |
Cache
aging issues |
|
|
| 7.2 |
Basic MLS Configuration
| 7.2.1 |
Configuring
the MLS route processor |
| 7.2.2 |
Assigning an
MLS interface to a VTP domain |
| 7.2.3 |
Enabling MLS
on an interface |
| 7.2.4 |
Common
Problem: creation of a null domain |
| 7.2.5 |
MLS
management interface |
| 7.2.6 |
Assigning a
VLAN ID to an interface on an external router |
| 7.2.7 |
Configuration
examples |
| 7.2.8 |
Verifying MLS
configuration |
| 7.2.9 |
When to use
MLS |
|
|
| 7.3 |
Flow Masks
| 7.3.1 |
Flow mask
overview |
| 7.3.2 |
Flow-mask
modes |
| 7.3.3 |
Output access
lists and flow masks |
| 7.3.4 |
Input access
lists and flow masks |
|
|
| 7.4 |
MLS on the Switch
| 7.4.1 |
Enabling and
disabling MLS on the switch |
| 7.4.2 |
Adding
external router MLS identification |
| 7.4.3 |
Verify MLS
configuration |
| 7.4.4 |
MLS
configuration example |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter 8: Hot
Standby Routing Protocol (HSRP) |
Chapter
Review
|
|
Chapter
Overview
|
|
| 8.1 |
HSRP Operation
| 8.1.1 |
Issues with
establishing redundancy |
| 8.1.2 |
How HSRP
addresses these issues |
| 8.1.3 |
HSRP
operations |
| 8.1.4 |
The virtual
router MAC address |
| 8.1.5 |
HSRP messages |
| 8.1.6 |
HSRP states |
|
|
| 8.2 |
HSRP Configuration
| 8.2.1 |
Configuring
HSRP |
| 8.2.2 |
HSRP standby
priority |
| 8.2.3 |
HSRP standby
preempt |
| 8.2.4 |
HSRP hello
timers |
| 8.2.5 |
HSRP
interface tracking |
| 8.2.6 |
Verify HSRP
configuration |
| 8.2.7 |
HSRP over
trunk links |
| 8.2.8 |
HSRP example:
complete configuration |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter
9: Multicasting |
Chapter
Review
|
|
Chapter
Overview
|
|
| 9.1 |
Multicasting Overview
| 9.1.1 |
IGMP and CGMP: Advanced traffic management |
| 9.1.2 |
Multicast
addressing |
| 9.1.3 |
Layer 3
multicast addressing |
| 9.1.4 |
Layer 2
multicast addressing |
|
|
| 9.2 |
IGMP
| 9.2.1 |
Subscribing
and maintaining groups |
| 9.2.2 |
IGMP version
1 |
| 9.2.3 |
Layer 2
multicast addressing |
| 9.2.4 |
IGMP version 1 and 2 interoperability |
| 9.2.5 |
IGMP in a switched environment |
| 9.2.6 |
CGMP |
|
|
| 9.3 |
Routing Multicast Traffic
| 9.3.1 |
Multicast
address |
| 9.3.2 |
Distribution
trees |
| 9.3.3 |
Source distribution tree |
| 9.3.4 |
Shared distribution tree |
| 9.3.5 |
Managing delivery of multicast packets |
|
|
| 9.4 |
Multicast Routing Protocols
| 9.4.1 |
Dense Mode |
| 9.4.2 |
Distance
vector multicast routing protocol (DVMRP) |
| 9.4.3 |
Multicast
open shortest path first |
| 9.4.4 |
Protocol
independent multicast dense mode |
| 9.4.5 |
Sparse mode
routing protocols |
|
|
| 9.5 |
Configure IP Multicast
Routing
| 9.5.1 |
Configuring
IP multicast routing process overview |
| 9.5.2 |
Configuring
PIM-DM |
| 9.5.3 |
PIM-SM configuration |
| 9.5.4 |
Verify PIM configuration |
| 9.5.5 |
Select a designated router |
| 9.5.6 |
Display a PIM neighbor |
|
|
| 9.6 |
Optional IP Multicast Routing
Tasks
| 9.6.1 |
Configure
Auto-RP |
| 9.6.2 |
Define scope of delivery of
multicast packets |
| 9.6.3 |
Join a multicast group |
| 9.6.4 |
Change IGMP versions |
| 9.6.5 |
Configure CGMP |
| 9.6.6 |
Configure CGMP leave |
|
|
| 9.7 |
Verifying CGMP
| 9.7.1 |
Verify CGMP configuration |
|
|
| 9.8 |
EXAMPLE: Configure
Multicast Routing
| 9.8.1 |
EXAMPLE:
Configure multicast routing |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|
| Chapter
10: Restricting Network Access |
Chapter
Review
|
|
Chapter
Overview
|
|
| 10.1 |
Policy Overview
| 10.1.1 |
Access policy
overview |
| 10.1.2 |
Policy in the
access layer |
| 10.1.3 |
Policy in the
distribution layer |
| 10.1.4 |
Policy in the
core layer |
|
|
| 10.2 |
Basic Security
| 10.2.1 |
Basic
security techniques |
| 10.2.2 |
Physical
security |
| 10.2.3 |
Basic
password protection |
| 10.2.4 |
Using AAA and
Cisco secure |
| 10.2.5 |
Restricting
VTY and HTTP access |
| 10.2.6 |
Configuring
timeouts |
| 10.2.7 |
Controlling
privilege levels |
| 10.2.8 |
Banner
messages |
|
|
| 10.3 |
Policy Configuration
| 10.3.1 |
Policy in the
access layer |
| 10.3.2 |
Policy in the
distribution layer |
| 10.3.3 |
Policy in the
core layer |
|
|
| Chapter
Summary |
|
| Chapter
Quiz |
|
|
|