switch content map flg vs cert guide

30
Foundation Learning Guide Topic Headers Switching Introduction Hubs and Swtiches Bridges and Switches Switches of Today Broadcast Domains MAC Addresses The Basic Ethernet Frame Format Basic Switching Function VLANs The Spanning Tree Protocol Trunking Port-Channels MultiLayer Switching (MLS) Campus Network Structure Hierarchical Network Design Access Layer Distribution Layer Core Layer Layer 3 in the Access Layer The Cisco Enterprise Campus Architecture The need for a Core Layer Types of Cisco Switches Comparing Layer 2 and Multilayer Switches MAC Address Forwarding Layer 2 Switch Operation Layer 3 Switch Operation Frame Rewrite Distributed Hardware Forwarding Cisco Switching Methods Route Caching Topology Based Switching Important Note: This content mapping was created using the ava Foundation Learning Guide Chapter Ch1 Fundamentals Review Ch2 Campus Network Design Fundamentals Useful commands for viewing and editing Catalyst switch MAC address tables

Upload: adora

Post on 11-Sep-2015

225 views

Category:

Documents


0 download

DESCRIPTION

Content Guide for Cisco CCNP Switch

TRANSCRIPT

  • Foundation Learning Guide Topic Headers

    Switching IntroductionHubs and SwtichesBridges and SwitchesSwitches of TodayBroadcast DomainsMAC AddressesThe Basic Ethernet Frame FormatBasic Switching FunctionVLANsThe Spanning Tree ProtocolTrunkingPort-ChannelsMultiLayer Switching (MLS)

    Campus Network StructureHierarchical Network DesignAccess LayerDistribution LayerCore LayerLayer 3 in the Access LayerThe Cisco Enterprise Campus ArchitectureThe need for a Core Layer

    Types of Cisco SwitchesComparing Layer 2 and Multilayer SwitchesMAC Address ForwardingLayer 2 Switch OperationLayer 3 Switch Operation

    Frame RewriteDistributed Hardware Forwarding

    Cisco Switching MethodsRoute CachingTopology Based Switching

    Important Note: This content mapping was created using the available draft chapters of the SWITCH Foundation Learning Guide (300-115), and may not be accurate with relation to the book when published

    Foundation Learning Guide Chapter

    Ch1 Fundamentals Review

    Ch2 Campus Network Design Fundamentals

    Useful commands for viewing and editing Catalyst switch MAC address tables

  • Hardware Forwarding Details

    Implementing VLANs and Trunks in a Campus EnvironmentVLAN OverviewVLAN SegmentationEnd-to-End VLANsLocal VLANsComparison of End-to-End VLANs and Local VLANsMapping VLANs to a hierarchical networkImplementing Trunks in a Campus EnvironmentUnderstanding Native VLAN in 802.1Q TrunkingUnderstanding DTPCisco Trunking Modes and MethodsVLAN Ranges and MappingsVLAN Ranges

    Configuring, Verifying, and Troubleshooting VLANs and TrunksVerifying VLAN configuration

    Configuring VLANs and Trunks

    Best Practices for VLANs and TrunkingVoice VLAN overviewSwitch configuration for wireless network supportVLAN Trunking ProtocolVTP OverviewVTP ModesVTP VersionsVTP Pruning

    VTP AuthenticationVTP AdvertisementsVTP Message typesSummary AdvertisementsSubset AdvertisementsAdvertisement Requests

    Configuring and verifying VTPOverwriting VTP configuration

    Ch2 Campus Network Design Fundamentals

    Ch3 Campus Network Architecture

  • Best Practices for VTP implementationImplementing EtherChannel in a Switched NetworkThe need for EtherChannelEtherChannel Mode InteractionsLACPPAgPLayer 2 EtherChannel configuration guidelinesEtherChannel Load-Balancing optionsConfiguring EtherChannel in a switched network

    EtherChannel configuration and Load-Balancing

    EtherChannel Guard

    Spanning Tree Protocol OverviewSTP OverviewSTP Operation

    Bridge Protocol Data Unit (BPDU)Root Bridge ElectionRoot port ElectionDesignated Port ElectionSTP Port StatesPer-VLAN STPSTP Topology ChangesRapid Spanning Tree Protocol

    RSTP Port Roles

    Comparison of RSTP and STP Port States

    RSTP Topology ChangesRSTP LinkTypesConfiguring and Modifying STP BehaviorChanging STP PrioritySTP Path Manipulation

    STP TimersImplementing STP Stability Mechanisms

    UplinkFast

    BackboneFast

    Ch3 Campus Network Architecture

    Ch4 Spanning Tree Implementation

  • PortFast

    Securing PortFast Interface with BPDU Guard

    Disabling STP with BPDU Filter

    Root Guard

    Loop Guard Overview

    UDLD

    UDLD Recommended PracticesFlexLinksSTP Stability Mechanisms RecommendationsImplementing Multiple Spanning Tree Protocol

    Introducing Multiple Spanning Tree ProtocolMST Regions

    STP Instances with MSTExtended System ID for MST

    Configuring MST

    Configuring MST Path Cost

    Configuring MST Port Priority

    MST Protocol Migration

    Ch4 Spanning Tree Implementation

  • MST Recommended Practice

    Ch5 InterVLAN Routing

    Implementing Inter-VLAN RoutingDescribing Inter-VLAN RoutingIntroduction to Inter-VLAN Routing

    Inter-VLAN Routing using an External Router Overview

    Configuring InterVLAN Routing using an External Router

    Routing with an External Router

    External Router: Advantages and Disadvantages

    Inter-VLAN Routing Using Switch Virtual InterfacesSVI: Advantages and Disadvantages

    Routing with Routed PortsRouted Port: Advantage and Disadvantage

    Configuring InterVLAN Routing using SVI and Routed Ports

    Overview

    Routing on a Multilayer SwitchSVI autostate exclude

    SVI Configuration ChecklistTroubleshooting Inter-VLAN Problems

    Layer 2 vs. Layer 3 EtherChannel

    Layer 3 EtherChannel configuration

    Verifying Routing ProtocolImplementing DHCPConfiguring DHCP in Multilayer Switched networkDHCP RelayDHCP Options

    First Hop Redundancy Protocols Introduction Overview of FHRP and HSRP

    Ch4 Spanning Tree Implementation

    Ch6 First Hop Redundancy Protocols

  • The Need for First Hop Redundancy HSRP State Transition HSRP and STP Configuring and Tuning HSRPForwarding Through Active Router Load Sharing with HSRP The Need for Interface Tracking with HSRPHSRP Interface Tracking HSRP and Object Tracking HSRP Authentication HSRP Timers HSRP Versions VRRPConfiguring Layer Redundancy with VRRPAbout VRRP Configure VRRP and Spot the Difference

    VRRP and Authentication

    Tracking and VRRP

    HSRP vs GLBP GLBP States GLBP Operation Explained GLBP Load Balancing Options

    GLBP Authentication

    GLBP and STP

    Tracking and GLBP

    Network ManagementAAAAuthenetication OptionsRADIUS and TACACS+ OverviewRADIUS Authentication ProcessTACACS+ Authentication ProcessConfiguring AAAConfiguring RADIUS for Console and VTY AccessConfiguring TACACS+ for Console and VTY AccessAAA AuthorizationAAA AccountingLimitations of TACACS+ and RADIUS

    Ch6 First Hop Redundancy Protocols

    Introducing GLBP

    Ch 7 Network Management

  • Identify-based Networking

    IEEE 802.1x Port-Based Authentication OverviewIEEE 802.1x Configuration Checklist

    Network Time Protocols

    The Need for Accurate TimeConfiguring the System Clock Manually

    Network Time Protocol Overview

    NTP Modes

    Other NTP Configuration Options

    NTP Example

    NTP Design PrinciplesSecuring NTP

    NTP VersionsNTP in IPv6 Topologies

    SNTP Overview

    PTP/IEEE-1588

    SNMPv3SNMP OverviewSNMP VersionsSNMP Best PracticesSNMPv3 Configuration ExampleVerifying SNMP Version 3 Configuration

    Discovery ProtocolsIntroduction to LLDPBasic configuration of LLDPDiscovery neighbors using LLDPUnidirectional Link Detection (UDLD)

    UDLD Mechanisms and SpecificsUDLD Configuration and Example

    Ch 7 Network Management

    Ch 8 Switching Features and Technologies

  • Leveraging UDLD and STP LoopGuard Together

    Power of Ethernet (POE)PoE ComponentsPoE StandardsPoE NegotiationConfiguring and Verifying PoE

    SDM TemplatesSDM Templates TypesChoosing the Right SDM Template

    System Resource Configuration on Other Platforms

    Monitoring Features (SPAN and RSPAN)

    SPAN and RSPAN OverviewSPAN Configuration

    RSPAN ConfigurationIP SLAIntroduction to IP SLAIP SLA Source and ResponderIP SLA ConfigurationIP SLA Operation with ResponderIP SLA TimestampsConfiguring Authentication for IP SLAIP SLA Example For UDP Jitter

    Ch 9 High Availability

    High Availability The Need for Logical Switching Architectures

    What is StackWise?StackWise BenefitsVerifying StackWiseWhat is VSS?VSS BenefitsVerifying VSS

    Ch 8 Switching Features and Technologies

  • Ch 9 High Availability

    Redundant Switch Supervisors

    Supervisor Redundancy Modes

    Stateful Switchover (SSO)

    Nonstop Forwarding (NSF)

    Campus Network Security

    Overview of Switch Security Issues

    Cisco Switch Recommended Security Configuration Best PracticesCampus Network Vulnerabilities

    Rogue Access

    Switch Vulnerabilities

    MAC Flooding Attack

    Introducing Port Security

    Port Security ConfigurationPort Error ConditionsError-Disabled Automatic Recovery

    Port Access ListsStorm Control

    Introduction to Storm ControlConfiguring Storm Control on an InterfaceMitigating Spoofing Attacks

    DHCP Spoofing Attacks

    DHCP Snooping

    DHCP Option 82

    Ch 10 Campus Network Security

  • DHCP Snooping Example Configuration

    IP Source GuardIP Source Guard Configuration

    ARP Spoofing

    Dynamic ARP InspectionDIA ConfigurationSecuring VLAN Trunks

    Switch SpoofingVLAN Hopping

    Protecting Against VLAN Hopping

    VLAN Access Lists (VACLs)

    VACL interaction with ACLs and PACLs

    Configuring VACLs

    Private VLANsIntroduction to Private VLANsPrivate VLAN Port TypesPrivate VLAN ConfigurationPrivate VLAN VerificationPrivate VLANs Across Multiple Switches

    Protected Port Feature

    Ch 10 Campus Network Security

  • Location in Cert Guide

    Topic HeaderCh2 "Switch Operation", Page 32, "Layer 2 Switch Operation"Ch2 "Switch Operation", Pages 32-35, "Transparent Bridging" Ch3 "Switch Port Configuration", Page 59, "Ethernet Overview"Cert Guide does not detail MAC Address details; This is a CCNA-Level TaskCert Guide does not detail IEEE 802.3 frame format details; This is a CCNA-Level TaskCh2 "Switch Operation", Pages 32-35, "Transparent Bridging"Basic Definition; Ch4 "VLANs and Trunks", Page 95, "Virtual LANs"Basic Definition; Ch6 "Traditional Spanning Tree Protocol", Page 151 "IEEE 802.1D Overview"Basic Definition; Ch4 "VLANs and Trunks", Pages 101-103, "VLAN Trunks"

    Basic Definition; Ch2 "Switch Operation", Page 36, "Multilayer Switch Operation"

    Topic HeaderCh1 "Enterprise Campus Network Design", Pages 7-11 "Hierachical Network Design"Ch1 "Enterprise Campus Network Design", Page 12 "Access Layer"Ch1 "Enterprise Campus Network Design", Page 12 "Distribution Layer"Ch1 "Enterprise Campus Network Design", Page 12 "Core Layer"Ch1 "Enterprise Campus Network Design", Page 20 (Referencing Figure 1-15)Ch1 "Enterprise Campus Network Design", Pages 13-24 "Modular Network Design"Ch1 "Enterprise Campus Network Design", Pages 20-24 "Network Core"

    Topic HeaderCh2 "Switch Operation", Pages, 32-36 "Layer 2 Switch Operation"Ch2"Switch Operation", Pages 32-36, "Layer 2 Switch Operation"Ch2 "Switch Operation", Pages 36-40, "Multilayer Switch Operation"

    Ch2 "Switch Operation", Pages 45-48, "Managing Switching Tables"Ch2"Switch Operation", Page 39, (In text starting with "During the multilayer")

    Ch2 "Switch Operation", Pages 36-39, "Types of Multilayer Switching"Ch2"Switch Operation", Page 37, "Route Caching"Ch2 "Switch Operation", Page 37, "Topology Based"

    Important Note: This content mapping was created using the available draft chapters of the SWITCH Foundation Learning Guide (300-115), and may not be accurate with relation to the book when published

    Basic Definition; Ch10 "Aggregating Switch Links", Pages 245-247, "Switch Port Aggregation with EtherChannel"

    Ch1 "Enterprise Campus Network Design", Pages 24-26 "Cisco Products in a Hierarchical Network Design"

  • Topic HeaderCh4 "VLANs and Trunks", Page 95, "Virtual LANs"Ch4 "VLANs and Trunks", Pages 99-100, "Deploying VLANs"Ch4 "VLANs and Trunks", Pages 100-101, "End-to-End VLANs"Ch4 "VLANs and Trunks",Page 101, "Local VLANs"

    Ch4 "VLANs and Trunks", Pages 101-105, "VLAN Trunks"

    Ch4 "VLANs and Trunks", Pages 96-98, "VLAN Membership"Ch4 "VLANs and Trunks", Page 99, (Referencing Example 4-2)

    "best practices" notes are embedded throughout the chapterCh4 "VLANs and Trunks", Pages 112-116, "Voice VLANs"Ch4 "VLANs and Trunks", Pages 117-118, "Wireless VLANs"Topic HeaderCh5 "VLAN Trunking Protocol" Page 127, "VLAN Trunking Protocol" and "VTP Domains"Ch5 "VLAN Trunking Protocol" Pages 127-128, "VTP Modes"Ch5 "VLAN Trunking Protocol" Pages 133-134, "Configuring the VTP Version"Ch5 "VLAN Trunking Protocol" Pages 138-140, "VTP Pruning"

    Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"

    Ch5 "VLAN Trunking Protocol" Pages 132-138, "VTP Configuration"

    Ch4 "VLANs and Trunks", Page 98, (In text starting with "Next, you should assign)Ch4 "VLANs and Trunks", Pages 106-110, "VLAN Trunk Configuration"Ch4 "VLANs and Trunks", Pages 110-112, "Troubleshooting VLANs and Trunks

  • "Best Practices" notes are embedded throughout the chapterTopic HeaderCh10 "Aggregating Switch Links", Pages 245-247, "Switch Port Aggregation with EtherChannel"Ch10 "Aggregating Switch Links", Page 251, "EtherChannel Negotiation Protocols"Ch10 "Aggregating Switch Links", Page 252, "Link Aggregation Control Protocol"Ch10 "Aggregating Switch Links", Page 252, "Port Aggregation Protocol"

    Ch10 "Aggregating Switch Links", Pages 247-249, "Distributing Traffic in EtherChannel"Topic Header

    Ch10 "Aggregating Switch Links", Pages 255-257, "Avoiding Misconfiguration with EtherChannel Guard"

    Topic HeaderTopic Header

    Ch 6 "Traditional Spanning Tree Protocol", pages 156-158, "Electing a Root Bridge"Ch 6 "Traditional Spanning Tree Protocol", pages 158-160, "Electing a Root Port"Ch 6 "Traditional Spanning Tree Protocol", pages 160-162, "Electing Designated Ports"Ch 6 "Traditional Spanning Tree Protocol", pages 162-165, "STP States"Ch 6 "Traditional Spanning Tree Protocol", pages 172-174, "Types of STP"Ch 6 "Traditional Spanning Tree Protocol", pages 167-172, "Topology Changes"Ch 9 "Advanced Spanning Tree Protocol", Page 223, "Rapid Spanning Tree Protocol"

    Ch 9 "Advanced Spanning Tree Protocol", Page 229, "Topology Changes and RSTP"

    Ch 7 "Spanning-Tree Configuration", Pages 181-184, "STP Root Bridge"Ch 7 "Spanning-Tree Configuration", Pages 184-188, "Root Bridge Configuration"Ch 7 "Spanning-Tree Configuration", Pages 188-191, "Spanning-Tree Customization"

    Ch 7 "Spanning-Tree Configuration", Pages 191-194, "Tuning Spanning-Tree Convergence"Topic Header

    Ch 7 "Spanning-Tree Configuration", Pages 196-197, "UplinkFast: Access Layer Uplinks"

    Ch 7 "Spanning-Tree Configuration", Pages 197-198, "BackboneFast: Redundant Backbone Paths"

    Ch10 "Aggregating Switch Links", Pages 253-255, "EtherChannel Configuration"Ch10 "Aggregating Switch Links", Pages 249-251, "Configure EtherChannel Load Balancing"

    Ch 6 "Traditional Spanning Tree Protocol", pages 155-156, "Spanning-Tree Communication: Bridge Protocol Data Units"

    Ch 9 "Advanced Spanning Tree Protocol", Page 224 (In text Starting with "The root bridge in a network")

  • Ch 7 "Spanning-Tree Configuration", Pages 194-196, "PortFast: Access Layer Nodes"

    Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 208-209, "BPDU Guard"

    Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 207-208, "Root Guard"

    Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages210-211, "Loop Guard"

    Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 211-213, "UDLD"

    (Not mentioned in Cert Guide)

    Ch 9 "Advanced Spanning Tree Protocol", Pages 234-236, "Spanning-Tree Instances Within MST"

    (Not mentioned in Cert Guide)

    Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 213-214, "Using BPDU Filtering to Disable STP on a Port"

  • (Not mentioned in Cert Guide)

    Topic HeaderTopic HeaderCh 11 "Multilayer Switching", Page 268, "InterVLAN Routing"

    Cert Guide does not detail InterVLAN Routing using an External Router; This is a CCNA-Level Task

    Cert Guide does not detail InterVLAN Routing using an External Router; This is a CCNA-Level Task

    Cert Guide does not detail InterVLAN Routing using an External Router; This is a CCNA-Level Task

    Cert Guide does not detail InterVLAN Routing using an External Router; This is a CCNA-Level Task

    Ch 11 "Multilayer Switching", Page 269-270, " Configuring InterVLAN Routing"

    Topic Header

    Topic Header

    Ch 11 "Multilayer Switch", Pages 280-284, "Verifying Multilayer Switching"Ch 11 "Multilayer Switch", Page 272, (In text Starting with "Be aware that an SVI")

    (L3 EtherChannel not mentioned)

    Topic HeaderCh 12 "Configuring DHCP", Pages 293-294, "Configuring an IPv4 DHCP Server"Ch 12 "Configuring DHCP", Pages 296, "Configuring DHCP Relay"Ch 12 "Configuring DHCP", Pages 296, "Configuring DHCP Options"

    Topic Header in Certification Guide Ch 13, Layer 3 High Availability, "Hot Standby Router Protocol", Page 385

    Ch 11 "Multilayer Switching", Pages 268-269, "Types of Interfaces"Ch 11 "Multilayer Switching", Pages 270-272, (In text starting with "Layer 2 Port Configuration")

  • Ch 13, Layer 3 High Availability, "HSRP Router Election", Page 386

    Ch 13, Layer 3 High Availability,"HSRP Gateway Addressing" , Page 390

    Ch 13, Layer 3 High Availability,"Load Balancing with HSRP", Page 391Ch 13, Layer 3 High Availability,"Conceding the Election", Page 389 Ch 13, Layer 3 High Availability,Conceding the Election, Page 389 Not covered in the Certification Guide

    Not covered in the Certification Guide Not covered in the Certification Guide Ch 13, Layer 3 High Availability,"VRRP", Pages 394 -396Ch 13, Layer 3 High Availability,"VRRP", Page 394Not covered in the Certification Guide Ch 13, Layer 3 High Availability,"VRRP", Page 394

    Not covered in the Certification Guide

    Not covered in the Certification Guide Ch 13, Layer 3 High Availability,"GLBP", Page 397Not covered in the Certification Guide

    Chapter 13, Layer 3 High Availability,"GLBP Load Balancing" , Page 400

    Not covered in the Certification Guide

    Not covered in the Certification Guide

    Not covered in the Certification Guide

    Ch 19, Securing Switch Access, "AAA", Page 464

    Ch 19, Securing Switch Access,TACACS+ and RADIUS, Page 464 Ch 19, Securing Switch Access,TACACS+ and RADIUS, Page 464 Ch 19, Securing Switch Access,TACACS+ and RADIUS, Page 464 Ch 19, Securing Switch Access,Configuring Authentication, Page 465-471 Ch 19, Securing Switch Access,Configuring Authentication, Page 467

    Not addressed in FLG version 7.0

    Ch 13, Layer 3 High Availability,"Plain Text Authentication", Page 388 ," MD5 Authentication", Page 388,

    Ch13, Layer 3 High Availability,"Active Virtual Gateway", P age 397Ch 13, Layer 3 High Availability,"Active Virtual Forwarder", Page 398

  • Ch 19, Securing Switch Access,Port Based Auentication, Page 418 Ch 19, Securing Switch Access,802.1x Configuration, Page 419 -421

    Ch 13, Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source, Page 313

    Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 313 Ch 13, "Logging Switch Activity: Setting the Internal System Clock", page 312

    Ch13,"Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 313

    Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 314

    Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 314

    Ch 13, "Logging Switch Activity:Securing NTP", Page 316

    Ch 13, "Logging Switch Activity", "Using NTP to Synchronize with an External Time Source", Page 313 Not covered in the Certification Guide

    Ch 13, "Logging Switch Activity:Using SNTP to Synchronize Time", Page 316

    Not covered in the Certification Guide

    Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 324Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 324Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 325Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 325Cha 14: Managing Switches with SNMP,Configuring SNMPv3, Page 328 Not covered in the Certification Guide

    Ch 3: Switch Port ConfigurationCh 3: Switch Port Configuration, "Link Layer Discover Protocol", Page 75Ch 3: Switch Port Configuration, "Link Layer Discover Protocol", Page 75-76Ch 3: Switch Port Configuration, "Link Layer Discover Protocol", Page 75-76Ch 8: Protecting the Spanning-Tree Topology, "UDLD", Page 211

    Ch 8: Protecting the Spanning-Tree Topology, "UDLD", Page 211 Ch 8: Protecting the Spanning-Tree Topology, "UDLD", Page 211

    Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 315, Example 13-1 and 13-2Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 314, Figure 13-3 addresses NTP Hierarchy

  • Ch 8: Protecting the Spanning-Tree Topology, UDLD, Page 216

    Ch 3: Switch Port Configuration, "Using Power over Ethernet", Page 77 Ch 3: Switch Port Configuration,Ch 3: Switch Port Configuration,How PoE Works, Page 78Ch 3: Switch Port Configuration,Detecting a Powered Device, Page 79

    Ch 2: Switch Operation, "Managing Switching Table Sizes", Page 49Ch 2: Switch Operation, "Managing Switching Table Sizes", Page 50-51Ch 2: Switch Operation,

    Not covered in the Certification Guide

    Ch 16: Using Port Mirroring to Monitor Traffic: "Using Port Mirrorring to Monitor Traffic", Page 349-362

    Ch 16: Using Port Mirroring to Monitor Traffic, "Local Span Configuration", Page 354

    Ch 16: Using Port Mirroring to Monitor Traffic "Remote SPAN", Page 357Ch 15: Monitoring Performance with IP SLA, Page 333-346Ch 15: Monitoring Performance with IP SLA, "IP SLA Overview", Page 336 Ch 15: Monitoring Performance with IP SLA "IP SLA Overview", Page 337Ch 15: Monitoring Performance with IP SLA, "Configuring IP SLA", Plage 338

    Ch 15: Monitoring Performance with IP SLA "Configuring IP SLA" , Plage 339Ch 15: Monitoring Performance with IP SLA "Configuring IP SLA" , Plage 339No specific example in Certification Guide

    Ch 17: Understanding High AvailabilityCh 17: Understanding High Availability, "Leveraging Logical Switches", Page 368

    Ch 17: Understanding High Availability, "Stackwise", Page 371 Ch 17: Understanding High Availability, "Stackwise", Page 372Not covered in the Certification Guide Ch 17: Understanding High Availability, "Virtual Switching System", Page 372 Virtual Switching System, Page 372

    Not covered in the Certification Guide

    Ch 3: Switch Port Configuration,Configuring PoE, Page 80Verifying PoE, Page 81

    Ch 16: Using Port Mirroring to Monitor Traffic, "Foundation Topics", Page 352-354, Remote SPAN, Page 356

    Ch 15: Monitoring Performance with IP SLA, " Configuring IP SLA", Page 339

  • Ch 17: Understanding High Availability, "Supervisor and Route Processor Redundancy" Page 373- 379

    Ch 17: Understanding High Availability "Configuring the Redundancy Mode", Page 374

    Ch 17: Understanding High Availability, "Redundant Switch Supervisors", Page 373

    Ch 17: Understanding High Availability,"Nonstop Forwarding", Page 377

    Cisco Switch Recommended Security Configuration Best PracticesCh 19: Securing Switch Access, "Part VII: Securing Switched Networks", Page 411

    Not covered in the Certification Guide

    Not covered in the Certification Guide

    Not covered in the Certification Guide

    Ch 19: Securing Switch Access, "Port Security", Page 415

    Ch 19: Securing Switch Access, "Port Security", Page 415 -416Ch 3: Switch Port Configuration, "Managing Error Conditions on a Switch Port", Page 69-71 Ch 3: Switch Port Configuration, "Managing Error Conditions on a Switch Port", Page 71

    Not covered in the Certification Guide Ch 19: Securing Switch Access, "Using Storm Control", Page 421-423

    Ch 19: Securing Switch Access, "Using Storm Control", Page 421-422Ch 19: Securing Switch Access, "Using Storm Control", Page 423Prevent Spoofing Attacks, Page 449-459

    Not covered in the Certification Guide

    Ch 21: Preventing Spoofing Attacks, "DHCP Snooping", Page 451

    Ch 21: Preventing Spoofing Attacks, "DHCP Snooping", Page 452-453

  • Ch 21: Preventing Spoofing Attacks, "DHCP Snooping" Page 452-453

    Ch 21: Preventing Spoofing Attacks, "IP Source Guard", Page 453-455Ch 21: Preventing Spoofing Attacks, "IP Source Guard", Page 454-455

    Ch 21: Preventing Spoofing Attacks, "Dynamic Arp Inspection", Page 455

    Ch 21: Preventing Spoofing Attacks, "Dynamic Arp Inspection", Page 455Ch 21: Preventing Spoofing Attacks, "Dynamic Arp Inspection", Page 456-457Ch 20: Securing VLANs Page 431-448

    Ch 20: Securing VLANs, "Switching Spoofing", Page 441 Ch 20: Securing VLANs, "VLAN Hopping", Page 443

    Not covered in the Certification Guide

    Ch 20: Securing VLANs "VLAN Access Lists", Page 435

    Not covered in the Certification Guide

    Ch 20: Securing VLANs "VLAN Access Lists", Page 436

    Ch 20: Securing VLANs, Page 436-441Ch 20: Securing VLANs "Private VLANs", Page 436-437Ch 20: Securing VLANs "Private VLANs", Page 436-437Ch 20: Securing VLANs, "Private VLAN Configuration", Page 438 -441, Configuration Example 20-2Not covered in the Certification Guide Not covered in the Certification Guide

    Not covered in the Certification Guide

  • Additional References and Notes

    Important Note: This content mapping was created using the available draft chapters of the SWITCH Foundation Learning Guide (300-115), and may not be accurate with relation to the book when

    From *DRAFT* FLG Chapter: If you have a very good understanding of switching terminology and a basic comprehensive of switching technology, you may want to skip this chapter and begin on Chapter 2."In summary, this chapter covers the following basic switching topics as a review to CCNA and serves a teaser for topics covered later in chapter"

    Also see Cisco Validated Designs: Campus Design Summary: http://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2014/CampusDesignSummary-AUG14.pdf and Campus Wired LAN Design Guide: http://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2014/CVD-CampusWiredLANDesignGuide-AUG14.pdf

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 216-217, "Explaining Layer 3 Switch Processing"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 220-221, "Distributed Hardware Forwarding"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 222-225, (Starting at "This section discusses the multilayer switching forwarding methods")

  • Covers Add/Change/Delete of VLANs switchport host command

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 224-225, ("CEF can occur at following two different locations on the switch:")Note: *DRAFT* FLG has limited coverage of CEF; use SWITCH FLG v6 Pages 215-237 and/or Cert Guide Chapter 11 Pages 272-280 for full coverage

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 56-57, "Comparison of End-to-End and Local VLANs"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 57-58, "Mapping VLANs to a Hierarchical Network"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 71-72, "Understanding Native VLAN in 802.1Q trunking"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 72-73, "Understanding DTP"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 72-73, "Understanding DTP"SWITCH Foundation Learning Guide (v6 - 642-813), Page 61, "VLAN Ranges"

    Assignment of a port to a VLAN, Verifying VLAN database contents and port assignments, Configuring a Trunk.SWITCH Foundation Learning Guide (v6 - 642-813), Pages 59-60, "Best Practices for VLAN design" and Pages 73-74 "Best Practices for Trunking"

    SWITCH Foundation Learning Guide (v6 - 642-813), Page 84, "VTP Authentication"VTPv1 & 2 Password Configuration: 3560 Software Configuration Guide: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swvtp.html#wp1035165VTPv3 Password Configuration: 3560 Software Configuration Guide http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swvtp.html#wp1312545

    VTPv3: 3560 Software Configuration Guide: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swvtp.htmlVTPv3: Catalyst 6500 Series Switches: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/solution_guide_c78_508010.html

  • SWITCH Foundation Learning Guide (v6 - 642-813), Page 84, "Best Practices for VTP Implementation"

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 105-106, "Configure Port Channels using EtherChannel"

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 122-123, "STP Operation"

    Note: *DRAFT* FLG paragraph highlights the PVST+ fields Bridge Priority, Extended System ID, and MAC Address

    Note: *DRAFT* FLG uses same introduction paragraph as SWITCH Foundation Learning Guide (v6 - 642-813), Pages 125-126, "Rapid Spanning Tree Protocol"Also see Cisco.Com "Understanding Rapid Spanning Tree Protocol":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24062-146.htmlSWITCH Foundation Learning Guide (v6 - 642-813), Pages 127-128, "RSTP Port Roles"SWITCH Foundation Learning Guide (v6 - 642-813), Page 129, Table 3-5, "802.1D and 802.1w Port Type and Port State Comparison"Note: Cert Guide provides very good coverage of RSTP Convergence between pages 225-229. This information is not present in the *DRAFT* FLGSWITCH Foundation Learning Guide (v6 - 642-813), Pages 129-130, "Rapid Transition to Forwarding"

    Timers":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/19120-122.html

    Configuring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.html

  • Configuring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.html

    Configuring UDLD: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swudld.htmlSee Cisco.Com "Best Practices for UniDirectional Link Detection (UDLD)":http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/best/practices/recommendations.html#wp1050563SWITCH Foundation Learning Guide (v6 - 642-813), Pages 166-167, "Flex Links"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 168-171, "Recommended Spanning Tree Practices"SWITCH Foundation Learning Guide (v6 - 6642-813), Page 141, "Multiple Spanning Tree" (First paragraph)SWITCH Foundation Learning Guide (v6 - 642-813), Pages 141-143, "Multiple Spanning Tree"Also see Cisco.Com "Understanding Multiple Spanning Tree Protocol":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24248-147.htmlSWITCH Foundation Learning Guide (v6 - 642-842), Pages 143-144, "MST Regions"

    SWITCH Foundation Learning Guide (v6 - 642-842), Page 144, "Extended System ID for MST"SWITCH Foundation Learning Guide (v6 - 642-842), Page 145-150, "Configuring MST"Configuring MSTP: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swmstp.htmlAlso see Cisco.Com "VTPv3 and MST: Catalyst 6500 Series Switches": http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/solution_guide_c78_508010.htmlConfiguring MSTP: Configuring Path Cost: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swmstp.html#wp1039394Configuring MSTP: Configuring Port Priority: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swmstp.html#wp1039280See Cisco.Com "Configuration example to migrate Spanning Tree from PVST+ to MST":http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/72844-MST.htmlAlso see Cisco.Com "Understanding Multiple Spanning Tree Protocol":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24248-147.html

  • Cisco.Com "Understanding Multiple Spanning Tree Protocol":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24248-147.html

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 195-197, "Inter_VLAN Configuration with External Router"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 186-189, "Inter-VLAN Routing Using an External Router (Router-on-a-Stick)"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 189-190, "External Router: Advantages and Disadvantages"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 190-192, "Inter-VLAN Routing Using Switch Virtual Interfaces"SWITCH Foundation Learning Guide (v6 - 642-813), Page 192, "SVI: Advantages and Disadvantages"

    SWITCH Foundation Learning Guide (v6 - 642-813), Page 193, "Routed Port: Advantages and Disadvantages"This section is a step-by-step walk through of configuring InterVLAN Routing using SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages 197-199This section is a step-by-step walk through of configuring InterVLAN Routing using SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages 197-199This section is a step-by-step walk through of configuring InterVLAN Routing using SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages 197-199SWITCH Foundation Learning Guide (v6 - 642-813), Pages 199-200, "SVI Autostate"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 197-198, "Inter-VLAN Configuration with SVI: Implementation Plan"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 204-206, " Troubleshooting Inter-VLAN Problems"

    Configuring EtherChannels: 3560 Software Configuration Guide: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swethchl.htmlSWITCH Foundation Learning Guide (v6 - 642-813), Pages 206-208, "Configuration of Layer 3 EtherChannel"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 208-210, "Routing Protocol Configuration" and "Verifying Routing Protocol"

    chapter 12 "Configuring DHCP", pages 297-299, "Configuring DHCP to support IPv6"Also - Cisco Documentation - IOS IPv6 Configuration Guide for IOS release 15.2M&Thttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/15-SWITCH Foundation Learning Guide (v6 - 642-813), Pages 288 , Chapter 5: Implementing High Availability and Redundancy in a Campus Network, "First Hop Redunandcy Protocols

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 244- , Chapter 5 Implementing High Availability and Redundancy in a Campus Network"

  • SWITCH Foundation Learning Guide (v6 - 642-813), Page 309-310,"VRRP"

    SWITCH Foundation Learning Guide (v6 - 642-813), Page 309-310,"VRRP"

    SWITCH Foundation Learning Guide (v6 - 642-813), Page 296, "HSRP Active Router and Spanning Tree Topology"SWITCH Foundation Learning Guide (v6 - 642-813), Page 296, "Configuring HSRP" SWITCH Foundation Learning Guide (v6 - 642-813), Page 296, "Configuring HSRP"

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 302-304 "HSRP Interface Tracking, HSRP Object Tracking, HSRP and IP SLA Tracking"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 302-304 "HSRP Interface Tracking, HSRP Object Tracking, HSRP and IP SLA Tracking"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 302-304 "HSRP Interface Tracking, HSRP Object Tracking, HSRP and IP SLA Tracking"SWITCH Foundation Learning Guide (v6 - 642-813), Page 298, "HSRP Authentication"SWITCH Foundation Learning Guide (v6 - 642-813), Page 299-301, "HSRP Timers Considerations and Configuration"SWITCH Foundation Learning Guide (v6 - 642-813), Page 301, "HSRP Versions"

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 312-315, " Configure VRRP"

    VRRP Authenticationhttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/12-4/fhp-12-4-book/fhp-vrrp.htmlVRRP Trackinghttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/12-4/fhp-12-4-book/fhp-vrrp.html

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 316, "Table 5-11, Comparison between HSRP and GLBP"

    Configuring GLBPhttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp-glbp.htmlConfiguring GLBPhttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp-glbp.htmlConfiguring GLBPhttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp-glbp.html

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 262-272, Chapter 5: Implementing High Availability, " Implementing Network Monitoring"

    Compare RADUIS and TACACS+http://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13838-10.html

  • Not covered in detail in CCNP:SWITCH v.6.0

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 387-390, " Security Using IEEE 802.1x Port-Based Authentication"

    "What's new in Version 4"http://www.ntp.org/ntpfaq/NTP-s-def.htm#Q-DEF-OV-V4NEWSImplementing NTPv4 in IPv6http://www.cisco.com/c/en/us/td/docs/ios/ipv6/configuration/guide/12_4t/ipv6_12_4t_book/ip6-ntpv4.html

    IEEE Standard for A Precison Clock Synchronization Protocol http://www.nist.gov/el/isd/ieee/ieee1588.cfmSecuring Simple Network Management Protocol, Document ID: 20370, www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094489.shtml

    Verifying SNMPv3http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe-3se/3850/snmp-xe-3se-3850-book/nm-snmp-snmpv3.html

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 373-376, " Neighbor Discovery Protocols"

    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swudld.html

  • Not covered in CCNP:SWITCH v.6.0

    Not covered in CCNP:SWITCH v.6.0

    LoopGuard versus UDLDhttp://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10596-84.htmlSWITCH Foundation Learning Guide (v6 - 642-813), Pages 491-493, "Power over Ethernet"

    Consult www.cisco.com product configuration guide for guidance on SDM Configuration for a specific platform.

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 398-410, Chapter 6: Securing the Campus Infrastructure " Troubleshooting Performance and Connectivity"

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 402, Chapter 6: Securing the Campus Infrastructure "Monitoring Performance with SPAN and VSPAN "

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 404-408, Chapter 6: Securing the Campus Infrastructure "Monitoring Performance RSPAN "SWITCH Foundation Learning Guide (v6 - 642-813), Pages 273-280 , Chapter 5: Implementing High Availability and Redundancy in a Campus Network "IP SLA"

    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swipsla.html

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 259-260 , Chapter 5: Implmenting High Availability, "StackWise Access Switches"

    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/15-1-2/XE_340/configuration/guide/config/vss.html#wp1060337http://www.cisco.com/c/dam/en/us/products/collateral/interfaces-modules/network-modules/white_paper_c11_429338.pdf

  • SWITCH Foundation Learning Guide (v6 - 642-813), Pages280 , Chapter 5: Implementing High Availability and Redundancy in a Campus Network "Implementing Redundant Supervisor Engines in Catalyst Switches"

    SWITCH Foundation Learning Guide (v6 - 642-813), Page 281 , Chapter 5: Implementing High Availability and Redundancy in a Campus Network, "Route Process Redundancy"

    SWITCH Foundation Learning Guide (v6 - 642-813), Page 284 , Chapter 5: Implementing High Availability and Redundancy in a Campus Network, "Stateful Switchover (SSO)"

    SWITCH Foundation Learning Guide (v6 - 642-813), Page 284 , Chapter 5: Implementing High Availability and Redundancy in a Campus Network, "Stateful Switchover (SSO)"

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 333-416 ,Chapter 6: Securing the Campus Infrastructure

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 333-416 ,Chapter 6: Securing the Campus Infrastructure " Switch Security Fundamentals" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 390-397 , "Switch Security Considerations. "

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 336 "Unauthorized Access by Rogue Devices" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 362 "Table 6-1 Switch Security Attacks and Mitigation Steps" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 338 "Understanding and Protecting Against MAC Layer Attack" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 341 "Port Security" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 343 "Port Security"

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352 "VLAN Access Control Lists" Configuring Port Based Traffic Control: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swtrafc.html

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 356 "DHCP Spoofing Attack" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 358 "DHCP Snooping " SWITCH Foundation Learning Guide (v6 - 642-813), Pages 359 "DHCP Snooping "

  • SWITCH Foundation Learning Guide (v6 - 642-813), Pages 368 "IP Spoofing and IP Source Guard "

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 361 "Arp Spoofing Attack " SWITCH Foundation Learning Guide (v6 - 642-813), Pages 362 "Arp Spoofing Attack "

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 350 "VLAN Hopping "

    SWITCH Foundation Learning Guide (v6 - 642-813), Pages 351-352 "Mitigating Against VLAN Hopping"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352 "VLAN Access Control Lists" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352-355 "VLAN Access Control Lists" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352-355 "VLAN Access Control Lists" SWITCH Foundation Learning Guide (v6 - 642-813), Chapter 2: Implementing VLANs in Campus Networks, Page 87-97, "Private VLANs"

    SWITCH Foundation Learning Guide (v6 - 642-813), Chapter 2: Implementing VLANs in Campus Networks, Page 121, "Port Protected Feature"

    Lesson Map