Академический Документы
Профессиональный Документы
Культура Документы
CISCO, INC.
POWERPOINT OBJECTIVES
CISCO, INC.
POWERPOINT OBJECTIVES
Configure basic security on a switch that will operate in a network designed to support voice, video, and data transmissions.
Summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard Describe the key elements of Ethernet/802.3 networks Describe the design considerations for Ethernet/802.3 networks Describe the LAN design considerations to reduce network latency Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN Describe the switch forwarding methods Explain symmetric and asymmetric Switching Describe how memory buffering works Compare Layer 2 with Layer 3 switching Configure a Switch for Operation in a Network Describe the Cisco IOS commands used to navigate the command-line Describe the Cisco IOS help facilities Describe the Cisco IOS commands used to access the command history Describe the boot sequence of a Cisco switch Describe how to perform a basic switch configuration Describe how to verify the Cisco IOS configuration using the Show command Describe how to manage the Cisco IOS configuration files Configure Basic Security on a Switch Describe the Cisco IOS commands used to configure password options Describe the Cisco IOS commands used to configure a login banner Describe the how to configure Telnet and SSH on a switch Describe the key switch security attacks. The description should include, MAC address flooding, spoofing attacks, CDP attacks, and Telnet attacks Describe how network security tools are used to improve network security Describe why you need to secure ports on a switch Describe the Cisco IOS commands used to disable unused ports Summary LAN Design o Process that explains how a LAN is to be implemented o Factors to consider in LAN design include Collision domains Broadcast domains Network latency LAN segmentation Switch forwarding methods
June 23, 2008 Page 2
CISCO, INC.
POWERPOINT OBJECTIVES
o Store & forward used by Cisco Catalyst switches o Cut through 2 types Cut through Fast forwarding Symmetric switching o Switching is conducted between ports that have the same bandwidth Asymmetric switching o Switching is conducted between ports that have unlike bandwidth CISCO IOS CLI includes the following features o Built in help o Command history/options Switch security o Password protection o Use of SSH for remote access o Port security
Chapter 3 VLANs
Objectives Explain the role of VLANs in a converged network. Explain the role of trunking VLANs in a converged network. Configure VLANs on the switches in a converged network topology. Troubleshoot the common software or hardware misconfigurations associated with VLANs on switches in a converged network topology. Explain the Role of VLANs in a Converged Network Explain the role of VLANs in a converged network Describe the different types VLANs Describe the VLAN port membership modes Describe how to manage broadcast domains with VLANs Explain the Role of Trunking VLANs in a Converged Network Explain the role of a trunk when using multiple VLANs in a converged network Describe how a trunk works Describe the switch port trunking modes Configure VLANs on the Switches in a Converged Network Topology Describe the steps to configure trunks and VLANs Describe the Cisco IOS commands used to create a VLAN on a Cisco Catalyst switch Describe the Cisco IOS commands used to manage VLANs on a Cisco Catalyst switch
June 23, 2008 Page 3
CISCO, INC.
POWERPOINT OBJECTIVES
Describe the Cisco IOS commands used to create a trunk on a Cisco Catalyst switch
Troubleshoot Common Software or Hardware Misconfigurations Associated with VLANs Describe the common problems with VLANs and trunks Describe how to use the troubleshooting procedure to fix a common problem with VLAN configurations Summary VLANS o Allows an administrator to logically group devices that act as their own network o Are used to segment broadcast domains o Some benefits of VLANs include Cost reduction, security, higher performance, better management Types of Traffic on a VLAN include o Data o Voice o Network protocol o Network management Communication between different VLANs requires the use of Routers Trunks o A common conduit used by multiple VLANS for intra-VLAN communication EEE 802.1Q o The standard trunking protocol o Uses frame tagging to identify the VLAN to which a frame belongs o Does not tag native VLAN traffic
Page 4
CISCO, INC.
POWERPOINT OBJECTIVES
Describe how VTP exchanges domain and VLAN information between switches in the same VTP domain Describe the role VTP modes play in enabling VTP to distribute and synchronize domain and VLAN configuration information in a network Explain how VTP pruning functions
Configure VTP on the Switches in a Converged Network Configure VTP on a Cisco Catalyst Switch Identify and troubleshoot common VTP configuration problems Manage VLANs on a VTP enabled network Summary VTP is a Cisco proprietary protocol used to exchange VLAN information across trunk links. o A switch can be in one of 3 VTP operating modes Client - Cannot create, modify or delete VLAN Server - Can create, modify & delete VLAN Transparent - Can create, modify, & delete LOCAL VLAN - Forwards VTP advertisements. VTP pruning o Limits unnecessary dissemination of VLAN information. Verify VTP configuration o Show VTP status o Show interfaces trunk
CISCO, INC.
POWERPOINT OBJECTIVES
Summarize How STP works to Eliminate Layer 2 Loops in a Converged Network Describe the STP algorithm Explain the role of the BPDU in STP Explain the role of the BID in STP Describe the how port roles support the operation of STP Describe the role of STP port states and BPDU timers in the operation of STP Explain How the STP Algorithm Uses Three Steps to Converge on a Loop-Free Topology Define convergence for a switched network and summarize the 3 step process STP uses to create a loop free topology Explain the STP decision sequence is used to elect a root bridge for a network Describe the process of electing a root port on a switch Describe the process of electing designated ports and non-designated ports on a switch Implement Rapid per VLAN Spanning Tree (rapid PVST+) in a LAN Summarize the features of the PVST+, RSTP and rapid PVST+ variants of STP Describe the features of PVST+ Describe the features of RSTP Describe RSTP edge ports Describe the RSTP link types Describe the RSTP port states and port roles Describe how to configure rapid PVST+ Describe how to design STP to avoid problems Describe how to identify and solve the key STP configuration issues Summary Spanning Tree Protocol (STP) is used to prevent loops from being formed on redundant networks. STP uses different port states & timers to logically prevent loops. There is at least one switch in a network that serves as the root bridge o Root bridge is elected using information found in BPDU frames Root ports are determined by the spanning tree algorithm and are closest to the root bridge. STP lengthy convergence time (50 seconds) facilitated the development of: o RSTP convergence time is slightly over 6 seconds o Rapid PVST+ adds VLAN support to RSTP is the preferred spanning-tree protocol on a Cisco switch network
Page 6
CISCO, INC.
POWERPOINT OBJECTIVES
CISCO, INC.
POWERPOINT OBJECTIVES
Configure and verify basic wireless LAN access. Configure and troubleshoot wireless client access.
Explain the Components and Operations of Basic Wireless LAN Topologies Describe why wireless LANs are a popular choice for small business LAN implementations Describe the 802.11 wireless standards Describe the components of a 802.11-based wireless infrastructure Describe how wireless networks operate Describe how to plan a wireless LAN Describe the threats to wireless LAN security Describe the wireless protocols. The description will include a description of 802.1x, a comparison of WPA and WPA2 as well as comparison of TKIP and AES Describe how to secure a wireless LAN from the key security threats Configure and Verify Basic Wireless LAN Access Configure a wireless access point Configure a wireless NIC Configure and Troubleshoot Wireless Client Access Describe how to solve access point firmware issues Describe how to solve incorrect channel settings Describe how to solve common RF interference issues Describe how to correct antenna misplacement Describe how to solve the common problems associated with wireless LAN encryption types Describe how to solve authentication problems associated with wireless LANs Summary Wireless LANs use standards such as o IEEE 802.11a o IEEE 802.11b o IEEE 802.11g o IEEE 802.11n Basic Service set o Mobile clients use a single access point for connectivity Extended service set o Multiple access point that share an SSID WLAN security practices/methods include o MAC address filtering o SSID making o Implementing WPA2 Configuration of wireless NIC and access point
June 23, 2008 Page 8
CISCO, INC.
POWERPOINT OBJECTIVES
o Configure both of them the same way SSID o Ensure that the latest firmware is installed Troubleshooting WLANs include doing the following: o Check channel setting o Check for interference
Page 9