Вы находитесь на странице: 1из 10

CCNA EXPLORATION V4.

0 LAN SWITCHING AND WIRELESS

ACCESSIBLE INSTRUCTOR MATERIALS POWERPOINT OBJECTIVES

Prepared by Cisco Learning Institute

June 23, 2008

LAN SWITCHING AND WIRELESS

CISCO, INC.

POWERPOINT OBJECTIVES

Chapter 1 LAN Design


Objectives Describe how a hierarchical network supports the voice, video and data needs of a small and medium-sized business. Match the appropriate Cisco switch to each layer in the hierarchical network design model. Describe how a Hierarchical Network Supports the Needs of a Small & MediumSized Business Explain the benefits of the hierarchical network model Describe the key principles of hierarchical network design Describe the role of a converged network in supporting small and medium-sized (SMB) business voice, video, and data needs Match the Appropriate Cisco Switch to each Layer in the Hierarchical Network Design Model Identify the considerations used to select a switch for a hierarchical network Identify the key features of switches that are used in hierarchical networks Identify the switch features found in each level in a hierarchical network Identify the Cisco switches used in SMB applications Summary Hierarchical Design model addresses performance, scalability, maintainability & manageability issues. Traffic Analysis is used to monitor network performance. Hierarchical Design Model is composed of 3 layers: o Access o Distribution o Core Switches selected for each layer must meet the needs of each hierarchical layer as well as the needs of the business.

Chapter 2 Configure a Switch


Objectives Summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard. Explain the functions that enable a switch to forward Ethernet frames in a LAN. Configure a switch for operation in a network designed to support voice, video, and data transmissions.
June 23, 2008 Page 1

LAN SWITCHING AND WIRELESS

CISCO, INC.

POWERPOINT OBJECTIVES
Configure basic security on a switch that will operate in a network designed to support voice, video, and data transmissions.

Summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard Describe the key elements of Ethernet/802.3 networks Describe the design considerations for Ethernet/802.3 networks Describe the LAN design considerations to reduce network latency Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN Describe the switch forwarding methods Explain symmetric and asymmetric Switching Describe how memory buffering works Compare Layer 2 with Layer 3 switching Configure a Switch for Operation in a Network Describe the Cisco IOS commands used to navigate the command-line Describe the Cisco IOS help facilities Describe the Cisco IOS commands used to access the command history Describe the boot sequence of a Cisco switch Describe how to perform a basic switch configuration Describe how to verify the Cisco IOS configuration using the Show command Describe how to manage the Cisco IOS configuration files Configure Basic Security on a Switch Describe the Cisco IOS commands used to configure password options Describe the Cisco IOS commands used to configure a login banner Describe the how to configure Telnet and SSH on a switch Describe the key switch security attacks. The description should include, MAC address flooding, spoofing attacks, CDP attacks, and Telnet attacks Describe how network security tools are used to improve network security Describe why you need to secure ports on a switch Describe the Cisco IOS commands used to disable unused ports Summary LAN Design o Process that explains how a LAN is to be implemented o Factors to consider in LAN design include Collision domains Broadcast domains Network latency LAN segmentation Switch forwarding methods
June 23, 2008 Page 2

LAN SWITCHING AND WIRELESS

CISCO, INC.

POWERPOINT OBJECTIVES
o Store & forward used by Cisco Catalyst switches o Cut through 2 types Cut through Fast forwarding Symmetric switching o Switching is conducted between ports that have the same bandwidth Asymmetric switching o Switching is conducted between ports that have unlike bandwidth CISCO IOS CLI includes the following features o Built in help o Command history/options Switch security o Password protection o Use of SSH for remote access o Port security

Chapter 3 VLANs
Objectives Explain the role of VLANs in a converged network. Explain the role of trunking VLANs in a converged network. Configure VLANs on the switches in a converged network topology. Troubleshoot the common software or hardware misconfigurations associated with VLANs on switches in a converged network topology. Explain the Role of VLANs in a Converged Network Explain the role of VLANs in a converged network Describe the different types VLANs Describe the VLAN port membership modes Describe how to manage broadcast domains with VLANs Explain the Role of Trunking VLANs in a Converged Network Explain the role of a trunk when using multiple VLANs in a converged network Describe how a trunk works Describe the switch port trunking modes Configure VLANs on the Switches in a Converged Network Topology Describe the steps to configure trunks and VLANs Describe the Cisco IOS commands used to create a VLAN on a Cisco Catalyst switch Describe the Cisco IOS commands used to manage VLANs on a Cisco Catalyst switch
June 23, 2008 Page 3

LAN SWITCHING AND WIRELESS

CISCO, INC.

POWERPOINT OBJECTIVES
Describe the Cisco IOS commands used to create a trunk on a Cisco Catalyst switch

Troubleshoot Common Software or Hardware Misconfigurations Associated with VLANs Describe the common problems with VLANs and trunks Describe how to use the troubleshooting procedure to fix a common problem with VLAN configurations Summary VLANS o Allows an administrator to logically group devices that act as their own network o Are used to segment broadcast domains o Some benefits of VLANs include Cost reduction, security, higher performance, better management Types of Traffic on a VLAN include o Data o Voice o Network protocol o Network management Communication between different VLANs requires the use of Routers Trunks o A common conduit used by multiple VLANS for intra-VLAN communication EEE 802.1Q o The standard trunking protocol o Uses frame tagging to identify the VLAN to which a frame belongs o Does not tag native VLAN traffic

Chapter 4 Implement VTP


Objectives Explain the role of VTP in a converged switched network. Describe the operation of VTP: VTP domains, VTP Modes, VTP Advertisements, and VTP Pruning. Configure VTP on the switches in a converged network. Explain the Role of VTP in a Converged Switched Network Explain the role of VTP in a multi-switch network Describe the Operation of VTP Describe the importance of the default VTP configuration Explain the role of domains in VTP

June 23, 2008

Page 4

LAN SWITCHING AND WIRELESS

CISCO, INC.

POWERPOINT OBJECTIVES
Describe how VTP exchanges domain and VLAN information between switches in the same VTP domain Describe the role VTP modes play in enabling VTP to distribute and synchronize domain and VLAN configuration information in a network Explain how VTP pruning functions

Configure VTP on the Switches in a Converged Network Configure VTP on a Cisco Catalyst Switch Identify and troubleshoot common VTP configuration problems Manage VLANs on a VTP enabled network Summary VTP is a Cisco proprietary protocol used to exchange VLAN information across trunk links. o A switch can be in one of 3 VTP operating modes Client - Cannot create, modify or delete VLAN Server - Can create, modify & delete VLAN Transparent - Can create, modify, & delete LOCAL VLAN - Forwards VTP advertisements. VTP pruning o Limits unnecessary dissemination of VLAN information. Verify VTP configuration o Show VTP status o Show interfaces trunk

Chapter 5 Implement Spanning Tree Protocols


Objectives Explain the role of redundancy in a converged network. Summarize how STP works to eliminate Layer 2 loops in a converged network. Explain how the STP algorithm uses three steps to converge on a loop-free topology. Implement rapid per VLAN spanning tree (rapid PVST+) in a LAN to prevent loops between redundant switches. Explain the Role of Redundancy in a Converged Switched Network Describe the role redundancy in a hierarchical network Describe how redundancy can disable a hierarchical network Explain how Layer 2 loops occur in well managed networks
June 23, 2008 Page 5

LAN SWITCHING AND WIRELESS

CISCO, INC.

POWERPOINT OBJECTIVES
Summarize How STP works to Eliminate Layer 2 Loops in a Converged Network Describe the STP algorithm Explain the role of the BPDU in STP Explain the role of the BID in STP Describe the how port roles support the operation of STP Describe the role of STP port states and BPDU timers in the operation of STP Explain How the STP Algorithm Uses Three Steps to Converge on a Loop-Free Topology Define convergence for a switched network and summarize the 3 step process STP uses to create a loop free topology Explain the STP decision sequence is used to elect a root bridge for a network Describe the process of electing a root port on a switch Describe the process of electing designated ports and non-designated ports on a switch Implement Rapid per VLAN Spanning Tree (rapid PVST+) in a LAN Summarize the features of the PVST+, RSTP and rapid PVST+ variants of STP Describe the features of PVST+ Describe the features of RSTP Describe RSTP edge ports Describe the RSTP link types Describe the RSTP port states and port roles Describe how to configure rapid PVST+ Describe how to design STP to avoid problems Describe how to identify and solve the key STP configuration issues Summary Spanning Tree Protocol (STP) is used to prevent loops from being formed on redundant networks. STP uses different port states & timers to logically prevent loops. There is at least one switch in a network that serves as the root bridge o Root bridge is elected using information found in BPDU frames Root ports are determined by the spanning tree algorithm and are closest to the root bridge. STP lengthy convergence time (50 seconds) facilitated the development of: o RSTP convergence time is slightly over 6 seconds o Rapid PVST+ adds VLAN support to RSTP is the preferred spanning-tree protocol on a Cisco switch network

June 23, 2008

Page 6

LAN SWITCHING AND WIRELESS

CISCO, INC.

POWERPOINT OBJECTIVES

Chapter 6 Implement Inter-VLAN Routing


Objectives Explain to the satisfaction of a qualified instructor how network traffic is routed between VLANs in a converged network. Configure inter-VLAN routing on a router to enable communications between enduser devices on separate VLANs. Troubleshoot common inter-VLAN connectivity issues. Explain How Network Traffic is Routed Between VLANs in a Converged Network Describe the routing options between VLANs Describe the role of interfaces and subinterfaces in supporting inter-VLAN routing Configure Inter-VLAN Routing Describe the steps to configure inter-VLAN routing Troubleshoot Common Inter-VLAN Connectivity Issues Describe the common switch configuration Issues Describe the common router configuration issues Describe the common IP Addressing Issues Summary Inter-VLAN routing is the process of routing information between VLANs. Inter-VLAN routing requires the use of a router or a layer 3 switch. Traditional inter-VLAN routing o Requires multiple router interfaces that are each connected to separate VLANs Router on a stick o This is an inter-VLAN routing topology that uses router sub interfaces connected to a layer 2 switch. o Each Subinterface must be configured with: An IP address Associated VLAN number Configuration of inter VLAN routing o Configure switch ports connected to router with correct VLAN o Configure each router subinterface with the correct IP address & VLAN ID Verify configuration on switch and router

Chapter 7 Configure a Wireless Router


Objectives Describe the components and operations of basic wireless LAN topologies. Describe the components and operations of basic wireless LAN security.
June 23, 2008 Page 7

LAN SWITCHING AND WIRELESS

CISCO, INC.

POWERPOINT OBJECTIVES
Configure and verify basic wireless LAN access. Configure and troubleshoot wireless client access.

Explain the Components and Operations of Basic Wireless LAN Topologies Describe why wireless LANs are a popular choice for small business LAN implementations Describe the 802.11 wireless standards Describe the components of a 802.11-based wireless infrastructure Describe how wireless networks operate Describe how to plan a wireless LAN Describe the threats to wireless LAN security Describe the wireless protocols. The description will include a description of 802.1x, a comparison of WPA and WPA2 as well as comparison of TKIP and AES Describe how to secure a wireless LAN from the key security threats Configure and Verify Basic Wireless LAN Access Configure a wireless access point Configure a wireless NIC Configure and Troubleshoot Wireless Client Access Describe how to solve access point firmware issues Describe how to solve incorrect channel settings Describe how to solve common RF interference issues Describe how to correct antenna misplacement Describe how to solve the common problems associated with wireless LAN encryption types Describe how to solve authentication problems associated with wireless LANs Summary Wireless LANs use standards such as o IEEE 802.11a o IEEE 802.11b o IEEE 802.11g o IEEE 802.11n Basic Service set o Mobile clients use a single access point for connectivity Extended service set o Multiple access point that share an SSID WLAN security practices/methods include o MAC address filtering o SSID making o Implementing WPA2 Configuration of wireless NIC and access point
June 23, 2008 Page 8

LAN SWITCHING AND WIRELESS

CISCO, INC.

POWERPOINT OBJECTIVES
o Configure both of them the same way SSID o Ensure that the latest firmware is installed Troubleshooting WLANs include doing the following: o Check channel setting o Check for interference

June 23, 2008

Page 9

Вам также может понравиться