Chapter 1-10

Outline:

Chapter 1: Overview of the Campus Network and Design Models
Chapter Review 
Chapter Overview 
1.1 Overview of a Campus Network
1.1.1 Traditional campus networks
1.1.2 Issues with traditional campus network designs
1.1.3 Traditional 80/20 rule of network traffic
1.1.4 The new 20/80 rule of network traffic
1.1.5 Key requirements of the evolving campus structure
1.1.6 Evolving campus structure
1.2 Key Characteristics of Various Switching Technologies
1.2.1 Switching and the OSI model
1.2.2 Layer 2 switching
1.2.3 Layer 3 switching
1.2.4 Layer 4 switching
1.2.5 Multilayer switching
1.3 LAN Switching and the Hierarchical Model of Network Design
1.3.1 Overview
1.3.2 The core layer
1.3.3 The distribution layer
1.3.4 The access layer
1.4 Building-Block Approach
1.4.1 Fundamental campus elements and contributing variables
1.4.2 The switch block
1.4.3 Scaling the switch block
1.4.4 Building the core block
1.4.5 Layer 2 and 3 backbone scaling
1.4.6 Advantages of the building-block approach
Chapter Summary
Chapter Quiz 
Chapter 2: LAN Media
Chapter Review 
Chapter Overview 
2.1 Legacy Media Types
2.1.1 Legacy Ethernet
2.1.2 CSMA/CD
2.1.3 Ethernet addressing
2.1.4 Unicast frames
2.1.5 Broadcast frames
2.1.6 Multicast frames
2.1.7 LAN frames and hex values
2.2 Fast Ethernet
2.2.1 10-Mbps vs. 100-Mbps
2.2.2 Full Duplex and Half Duplex
2.2.3 100BASE-TX
2.2.4 100BASE-T4
2.2.5 100BASE-FX
2.2.6 Practical considerations before moving to Fast Ethernet
2.3 Gigabit Ethernet
2.3.1 Specifications
2.3.2 Gigabit architecture
2.3.3 Full Duplex and Half Duplex support
2.3.4  Gigabit media options
2.4 Determining Bandwidth Needs
2.4.1 Determining bandwidth needs
2.4.2 Gathering user statistics
2.4.3 Gathering traffic statistics
2.4.4 Determining the access-layer requirements
2.4.5 Determining the distribution-layer requirements
Chapter Summary
Chapter Quiz 
Chapter 3: Configure the Switch
Chapter Review 
Chapter Overview 
3.1 Initial Connectivity to the Switch
3.1.1 Cabling the switch block
3.1.2 Connecting to the console port
3.1.3 Connecting an Ethernet port
3.2 Basic Configuration of the Switch
3.2.1 Clearing a configuration and Cisco 2900 series 
3.2.2 Setting a password
3.2.3 Naming the switch
3.2.4 Configure the switch for remote access
3.2.5 Identifying individual ports
3.2.6 Defining link speed
3.2.7 Defining line mode on a switch
3.3 Important IOS Features
3.3.1 Command-line recall
3.3.2 Using the help feature
3.3.3 Show commands on a set command-based switch
3.3.4 Password recovery
3.3.5 Setting an IDLE timeout
3.3.6 Verifying connectivity
3.3.7 Backup and restoration of a configuration using a TFTP server
3.3.8 HTTP switch commands
Chapter Summary
Chapter Quiz 
Chapter 4: Introduction to VLANs
Chapter Review
Chapter Overview 
4.1 VLAN Basics
4.1.1 Describe a VLAN
4.1.2 Why are VLANs necessary?
4.1.3 VLANs and network security
4.1.4 VLANs and broadcast distribution
4.1.5 VLANs and bandwidth utilization
4.1.6 VLANs vs. network latency from routers
4.1.7 VLANs vs. complex access lists
4.1.8 Wrong motives for implementing VLANs
4.2 VLAN Types
4.2.1 VLAN boundaries
4.2.2 End-to-end VLANs
4.2.3 Local VLANs
4.2.4 Establishing VLAN memberships
4.2.5 Port-based VLAN membership
4.2.6 Dynamic VLANs
4.3 Configuring VLANs
4.3.1 Configuring static VLANs
4.3.2 Verify VLAN configuration
4.3.3 Deleting VLANs
4.3.4 Configure the VMPS server
4.3.5 Configure a VMPS client
4.3.6 Access links and trunk links
4.4 VLAN Identification
4.4.1 VLAN frame identification
4.4.2 ISL
4.4.3 IEEE 802.1Q
4.4.4 LANE
4.4.5 IEEE 802.10 protocol
4.5 Trunking
4.5.1 Trunking overview
4.5.2 Configuring a VLAN trunk
4.5.3 Removing VLANs from a trunk
4.6 VLAN Trunking Protocol (VTP)
4.6.1 VTP benefits
4.6.2 VTP operation
4.6.3 VTP modes
4.6.4 Adding a switch to a VTP domain
4.6.5 VTP advertisements
4.7 VTP Configuration
4.7.1 Basic configuration steps
4.7.2 Configure the VTP version
4.7.3 Configure the VTP domain
4.7.4 Configure the VTP mode
4.7.5 Verify VTP configuration
4.8 VTP Pruning
4.8.1 Default behavior of a switch
4.8.2 Configure VTP pruning
4.8.3 Verify VTP pruning
Chapter Summary
Chapter Quiz
Chapter 5: Spanning Tree Protocol (STP) and Redundant Links
Chapter Review
Chapter Overview 
5.1 Basic STP Operations
5.1.1 Usefulness of STP
5.1.2 Broadcast loops
5.1.3 Bridge-table corruption
5.1.4 Bridge identification
5.1.5 Path cost
5.1.6 Four-step STP decision sequence
5.2 STP Processes
5.2.1 Three steps of initial STP convergence
5.2.2 Root-bridge elections
5.2.3 Electing root ports
5.2.4 Electing designated ports
5.2.5 Spanning-Tree port states
5.2.6 STP timers 
5.2.7 Topology changes and STP 
5.2.8 Spanning-Tree example
5.2.9 Enabling and verifying Spanning Tree
5.3 VLANs and STP
5.3.1 Per-VLAN STP
5.3.2 Common STP
5.3.3 Per-VLAN Spanning Tree plus (PVST+)
5.4 STP in the Campus Network
5.4.1 Establishing a root bridge
5.4.2 Determining the best loop-free path to the root bridge
5.4.3 Configure the port cost
5.4.4 Modifying port priority
5.4.5 Modifying port priority by VLAN
5.4.6 Modifying STP timers
5.5 Redundant Links
5.5.1 EtherChannel technology
5.5.2 Port aggregation protocol
5.5.3 EtherChannel rules of the road
5.5.4 Configuring fast EtherChannel
5.5.5 Configuring PortFast
5.5.6 Configuring UplinkFast
5.5.7 Configuring BackboneFast
Chapter Summary
Chapter Quiz
Chapter 6: Routing between VLANs
Chapter Review
Chapter Overview 
6.1 VLAN Issues
6.1.1 Importance of routing
6.1.2 Inter-VLAN issues and solutions
6.1.3 Isolated broadcast domains
6.1.4 Finding the route between VLANs
6.1.5 Supporting multiple VLAN traffic
6.1.6 Distribution-layer topology
6.1.7 External routers
6.1.8 Internal route processors (RSM)
6.2 Route Switch Modules
6.2.1 Configuring iInter-VLAN routing
6.2.2 Accessing the RSM
6.2.3 Configure a routing protocol on the RSM
6.2.4 Configure RSM interfaces
6.2.5 Configure a default gateway on the switch
6.3 External Routers
6.3.1 Configuring external routers
6.3.2 Router on a stick
6.3.3 Trunk-connected routers
6.3.4 When to use the router-on-a-stick design
6.3.5 Configuration example
Chapter Summary
Chapter Quiz

 

Chapter 7: Multilayer Switching
Chapter Review 
Chapter Overview 
7.1 MLS Processes
7.1.1 MLS overview
7.1.2 MLS hardware and software requirements
7.1.3 MLS operations
7.1.4 Step 1: MLS hello packets are sent by the MLS-RP
7.1.5 Step 2: The MLS-SE identifies candidate packets
7.1.6 Step 3: The MLS-SE identifies enable packets
7.1.7 Step 4: The MLS-SE shortcuts future packets
7.1.8 Cache aging issues
7.2 Basic MLS Configuration
7.2.1 Configuring the MLS route processor
7.2.2 Assigning an MLS interface to a VTP domain
7.2.3 Enabling MLS on an interface
7.2.4 Common Problem: creation of a null domain
7.2.5 MLS management interface
7.2.6 Assigning a VLAN ID to an interface on an external router
7.2.7 Configuration examples
7.2.8 Verifying MLS configuration
7.2.9 When to use MLS
7.3 Flow Masks
7.3.1 Flow mask overview
7.3.2 Flow-mask modes
7.3.3 Output access lists and flow masks
7.3.4 Input access lists and flow masks
7.4 MLS on the Switch
7.4.1 Enabling and disabling MLS on the switch
7.4.2 Adding external router MLS identification
7.4.3 Verify MLS configuration
7.4.4 MLS configuration example
Chapter Summary
Chapter Quiz 
Chapter 8: Hot Standby Routing Protocol (HSRP)
Chapter Review 
Chapter Overview 
8.1 HSRP Operation
8.1.1 Issues with establishing redundancy
8.1.2 How HSRP addresses these issues
8.1.3 HSRP operations
8.1.4 The virtual router MAC address
8.1.5 HSRP messages
8.1.6 HSRP states
8.2 HSRP Configuration
8.2.1 Configuring HSRP
8.2.2 HSRP standby priority
8.2.3 HSRP standby preempt
8.2.4 HSRP hello timers
8.2.5 HSRP interface tracking
8.2.6 Verify HSRP configuration
8.2.7 HSRP over trunk links
8.2.8 HSRP example: complete configuration
Chapter Summary
Chapter Quiz 
Chapter 9: Multicasting
Chapter Review 
Chapter Overview 
9.1 Multicasting Overview
9.1.1 IGMP and CGMP: Advanced traffic management
9.1.2 Multicast addressing
9.1.3 Layer 3 multicast addressing
9.1.4 Layer 2 multicast addressing
9.2 IGMP
9.2.1 Subscribing and maintaining groups
9.2.2 IGMP version 1
9.2.3 Layer 2 multicast addressing
9.2.4 IGMP version 1 and 2 interoperability
9.2.5 IGMP in a switched environment
9.2.6 CGMP
9.3 Routing Multicast Traffic
9.3.1 Multicast address
9.3.2 Distribution trees
9.3.3 Source distribution tree
9.3.4 Shared distribution tree
9.3.5 Managing delivery of multicast packets
9.4 Multicast Routing Protocols
9.4.1 Dense Mode
9.4.2 Distance vector multicast routing protocol (DVMRP)
9.4.3 Multicast open shortest path first
9.4.4 Protocol independent multicast dense mode
9.4.5 Sparse mode routing protocols
9.5 Configure IP Multicast Routing
9.5.1 Configuring IP multicast routing process overview
9.5.2 Configuring PIM-DM
9.5.3 PIM-SM configuration
9.5.4 Verify PIM configuration
9.5.5 Select a designated router
9.5.6 Display a PIM neighbor
9.6 Optional IP Multicast Routing Tasks
9.6.1 Configure Auto-RP
9.6.2 Define scope of delivery of multicast packets
9.6.3 Join a multicast group
9.6.4 Change IGMP versions
9.6.5 Configure CGMP
9.6.6 Configure CGMP leave
9.7 Verifying CGMP
9.7.1 Verify CGMP configuration
9.8 EXAMPLE: Configure Multicast Routing
9.8.1 EXAMPLE: Configure multicast routing
Chapter Summary
Chapter Quiz 
Chapter 10: Restricting Network Access
Chapter Review 
Chapter Overview 
10.1 Policy Overview
10.1.1 Access policy overview
10.1.2 Policy in the access layer
10.1.3 Policy in the distribution layer
10.1.4 Policy in the core layer
10.2 Basic Security
10.2.1 Basic security techniques
10.2.2 Physical security
10.2.3 Basic password protection
10.2.4 Using AAA and Cisco secure
10.2.5 Restricting VTY and HTTP access
10.2.6 Configuring timeouts
10.2.7 Controlling privilege levels
10.2.8 Banner messages
10.3 Policy Configuration
10.3.1 Policy in the access layer
10.3.2 Policy in the distribution layer
10.3.3 Policy in the core layer
Chapter Summary
Chapter Quiz