switch content map flg vs cert guide
DESCRIPTION
Content Guide for Cisco CCNP SwitchTRANSCRIPT
-
Foundation Learning Guide Topic Headers
Switching IntroductionHubs and SwtichesBridges and SwitchesSwitches of TodayBroadcast DomainsMAC AddressesThe Basic Ethernet Frame FormatBasic Switching FunctionVLANsThe Spanning Tree ProtocolTrunkingPort-ChannelsMultiLayer Switching (MLS)
Campus Network StructureHierarchical Network DesignAccess LayerDistribution LayerCore LayerLayer 3 in the Access LayerThe Cisco Enterprise Campus ArchitectureThe need for a Core Layer
Types of Cisco SwitchesComparing Layer 2 and Multilayer SwitchesMAC Address ForwardingLayer 2 Switch OperationLayer 3 Switch Operation
Frame RewriteDistributed Hardware Forwarding
Cisco Switching MethodsRoute CachingTopology Based Switching
Important Note: This content mapping was created using the available draft chapters of the SWITCH Foundation Learning Guide (300-115), and may not be accurate with relation to the book when published
Foundation Learning Guide Chapter
Ch1 Fundamentals Review
Ch2 Campus Network Design Fundamentals
Useful commands for viewing and editing Catalyst switch MAC address tables
-
Hardware Forwarding Details
Implementing VLANs and Trunks in a Campus EnvironmentVLAN OverviewVLAN SegmentationEnd-to-End VLANsLocal VLANsComparison of End-to-End VLANs and Local VLANsMapping VLANs to a hierarchical networkImplementing Trunks in a Campus EnvironmentUnderstanding Native VLAN in 802.1Q TrunkingUnderstanding DTPCisco Trunking Modes and MethodsVLAN Ranges and MappingsVLAN Ranges
Configuring, Verifying, and Troubleshooting VLANs and TrunksVerifying VLAN configuration
Configuring VLANs and Trunks
Best Practices for VLANs and TrunkingVoice VLAN overviewSwitch configuration for wireless network supportVLAN Trunking ProtocolVTP OverviewVTP ModesVTP VersionsVTP Pruning
VTP AuthenticationVTP AdvertisementsVTP Message typesSummary AdvertisementsSubset AdvertisementsAdvertisement Requests
Configuring and verifying VTPOverwriting VTP configuration
Ch2 Campus Network Design Fundamentals
Ch3 Campus Network Architecture
-
Best Practices for VTP implementationImplementing EtherChannel in a Switched NetworkThe need for EtherChannelEtherChannel Mode InteractionsLACPPAgPLayer 2 EtherChannel configuration guidelinesEtherChannel Load-Balancing optionsConfiguring EtherChannel in a switched network
EtherChannel configuration and Load-Balancing
EtherChannel Guard
Spanning Tree Protocol OverviewSTP OverviewSTP Operation
Bridge Protocol Data Unit (BPDU)Root Bridge ElectionRoot port ElectionDesignated Port ElectionSTP Port StatesPer-VLAN STPSTP Topology ChangesRapid Spanning Tree Protocol
RSTP Port Roles
Comparison of RSTP and STP Port States
RSTP Topology ChangesRSTP LinkTypesConfiguring and Modifying STP BehaviorChanging STP PrioritySTP Path Manipulation
STP TimersImplementing STP Stability Mechanisms
UplinkFast
BackboneFast
Ch3 Campus Network Architecture
Ch4 Spanning Tree Implementation
-
PortFast
Securing PortFast Interface with BPDU Guard
Disabling STP with BPDU Filter
Root Guard
Loop Guard Overview
UDLD
UDLD Recommended PracticesFlexLinksSTP Stability Mechanisms RecommendationsImplementing Multiple Spanning Tree Protocol
Introducing Multiple Spanning Tree ProtocolMST Regions
STP Instances with MSTExtended System ID for MST
Configuring MST
Configuring MST Path Cost
Configuring MST Port Priority
MST Protocol Migration
Ch4 Spanning Tree Implementation
-
MST Recommended Practice
Ch5 InterVLAN Routing
Implementing Inter-VLAN RoutingDescribing Inter-VLAN RoutingIntroduction to Inter-VLAN Routing
Inter-VLAN Routing using an External Router Overview
Configuring InterVLAN Routing using an External Router
Routing with an External Router
External Router: Advantages and Disadvantages
Inter-VLAN Routing Using Switch Virtual InterfacesSVI: Advantages and Disadvantages
Routing with Routed PortsRouted Port: Advantage and Disadvantage
Configuring InterVLAN Routing using SVI and Routed Ports
Overview
Routing on a Multilayer SwitchSVI autostate exclude
SVI Configuration ChecklistTroubleshooting Inter-VLAN Problems
Layer 2 vs. Layer 3 EtherChannel
Layer 3 EtherChannel configuration
Verifying Routing ProtocolImplementing DHCPConfiguring DHCP in Multilayer Switched networkDHCP RelayDHCP Options
First Hop Redundancy Protocols Introduction Overview of FHRP and HSRP
Ch4 Spanning Tree Implementation
Ch6 First Hop Redundancy Protocols
-
The Need for First Hop Redundancy HSRP State Transition HSRP and STP Configuring and Tuning HSRPForwarding Through Active Router Load Sharing with HSRP The Need for Interface Tracking with HSRPHSRP Interface Tracking HSRP and Object Tracking HSRP Authentication HSRP Timers HSRP Versions VRRPConfiguring Layer Redundancy with VRRPAbout VRRP Configure VRRP and Spot the Difference
VRRP and Authentication
Tracking and VRRP
HSRP vs GLBP GLBP States GLBP Operation Explained GLBP Load Balancing Options
GLBP Authentication
GLBP and STP
Tracking and GLBP
Network ManagementAAAAuthenetication OptionsRADIUS and TACACS+ OverviewRADIUS Authentication ProcessTACACS+ Authentication ProcessConfiguring AAAConfiguring RADIUS for Console and VTY AccessConfiguring TACACS+ for Console and VTY AccessAAA AuthorizationAAA AccountingLimitations of TACACS+ and RADIUS
Ch6 First Hop Redundancy Protocols
Introducing GLBP
Ch 7 Network Management
-
Identify-based Networking
IEEE 802.1x Port-Based Authentication OverviewIEEE 802.1x Configuration Checklist
Network Time Protocols
The Need for Accurate TimeConfiguring the System Clock Manually
Network Time Protocol Overview
NTP Modes
Other NTP Configuration Options
NTP Example
NTP Design PrinciplesSecuring NTP
NTP VersionsNTP in IPv6 Topologies
SNTP Overview
PTP/IEEE-1588
SNMPv3SNMP OverviewSNMP VersionsSNMP Best PracticesSNMPv3 Configuration ExampleVerifying SNMP Version 3 Configuration
Discovery ProtocolsIntroduction to LLDPBasic configuration of LLDPDiscovery neighbors using LLDPUnidirectional Link Detection (UDLD)
UDLD Mechanisms and SpecificsUDLD Configuration and Example
Ch 7 Network Management
Ch 8 Switching Features and Technologies
-
Leveraging UDLD and STP LoopGuard Together
Power of Ethernet (POE)PoE ComponentsPoE StandardsPoE NegotiationConfiguring and Verifying PoE
SDM TemplatesSDM Templates TypesChoosing the Right SDM Template
System Resource Configuration on Other Platforms
Monitoring Features (SPAN and RSPAN)
SPAN and RSPAN OverviewSPAN Configuration
RSPAN ConfigurationIP SLAIntroduction to IP SLAIP SLA Source and ResponderIP SLA ConfigurationIP SLA Operation with ResponderIP SLA TimestampsConfiguring Authentication for IP SLAIP SLA Example For UDP Jitter
Ch 9 High Availability
High Availability The Need for Logical Switching Architectures
What is StackWise?StackWise BenefitsVerifying StackWiseWhat is VSS?VSS BenefitsVerifying VSS
Ch 8 Switching Features and Technologies
-
Ch 9 High Availability
Redundant Switch Supervisors
Supervisor Redundancy Modes
Stateful Switchover (SSO)
Nonstop Forwarding (NSF)
Campus Network Security
Overview of Switch Security Issues
Cisco Switch Recommended Security Configuration Best PracticesCampus Network Vulnerabilities
Rogue Access
Switch Vulnerabilities
MAC Flooding Attack
Introducing Port Security
Port Security ConfigurationPort Error ConditionsError-Disabled Automatic Recovery
Port Access ListsStorm Control
Introduction to Storm ControlConfiguring Storm Control on an InterfaceMitigating Spoofing Attacks
DHCP Spoofing Attacks
DHCP Snooping
DHCP Option 82
Ch 10 Campus Network Security
-
DHCP Snooping Example Configuration
IP Source GuardIP Source Guard Configuration
ARP Spoofing
Dynamic ARP InspectionDIA ConfigurationSecuring VLAN Trunks
Switch SpoofingVLAN Hopping
Protecting Against VLAN Hopping
VLAN Access Lists (VACLs)
VACL interaction with ACLs and PACLs
Configuring VACLs
Private VLANsIntroduction to Private VLANsPrivate VLAN Port TypesPrivate VLAN ConfigurationPrivate VLAN VerificationPrivate VLANs Across Multiple Switches
Protected Port Feature
Ch 10 Campus Network Security
-
Location in Cert Guide
Topic HeaderCh2 "Switch Operation", Page 32, "Layer 2 Switch Operation"Ch2 "Switch Operation", Pages 32-35, "Transparent Bridging" Ch3 "Switch Port Configuration", Page 59, "Ethernet Overview"Cert Guide does not detail MAC Address details; This is a CCNA-Level TaskCert Guide does not detail IEEE 802.3 frame format details; This is a CCNA-Level TaskCh2 "Switch Operation", Pages 32-35, "Transparent Bridging"Basic Definition; Ch4 "VLANs and Trunks", Page 95, "Virtual LANs"Basic Definition; Ch6 "Traditional Spanning Tree Protocol", Page 151 "IEEE 802.1D Overview"Basic Definition; Ch4 "VLANs and Trunks", Pages 101-103, "VLAN Trunks"
Basic Definition; Ch2 "Switch Operation", Page 36, "Multilayer Switch Operation"
Topic HeaderCh1 "Enterprise Campus Network Design", Pages 7-11 "Hierachical Network Design"Ch1 "Enterprise Campus Network Design", Page 12 "Access Layer"Ch1 "Enterprise Campus Network Design", Page 12 "Distribution Layer"Ch1 "Enterprise Campus Network Design", Page 12 "Core Layer"Ch1 "Enterprise Campus Network Design", Page 20 (Referencing Figure 1-15)Ch1 "Enterprise Campus Network Design", Pages 13-24 "Modular Network Design"Ch1 "Enterprise Campus Network Design", Pages 20-24 "Network Core"
Topic HeaderCh2 "Switch Operation", Pages, 32-36 "Layer 2 Switch Operation"Ch2"Switch Operation", Pages 32-36, "Layer 2 Switch Operation"Ch2 "Switch Operation", Pages 36-40, "Multilayer Switch Operation"
Ch2 "Switch Operation", Pages 45-48, "Managing Switching Tables"Ch2"Switch Operation", Page 39, (In text starting with "During the multilayer")
Ch2 "Switch Operation", Pages 36-39, "Types of Multilayer Switching"Ch2"Switch Operation", Page 37, "Route Caching"Ch2 "Switch Operation", Page 37, "Topology Based"
Important Note: This content mapping was created using the available draft chapters of the SWITCH Foundation Learning Guide (300-115), and may not be accurate with relation to the book when published
Basic Definition; Ch10 "Aggregating Switch Links", Pages 245-247, "Switch Port Aggregation with EtherChannel"
Ch1 "Enterprise Campus Network Design", Pages 24-26 "Cisco Products in a Hierarchical Network Design"
-
Topic HeaderCh4 "VLANs and Trunks", Page 95, "Virtual LANs"Ch4 "VLANs and Trunks", Pages 99-100, "Deploying VLANs"Ch4 "VLANs and Trunks", Pages 100-101, "End-to-End VLANs"Ch4 "VLANs and Trunks",Page 101, "Local VLANs"
Ch4 "VLANs and Trunks", Pages 101-105, "VLAN Trunks"
Ch4 "VLANs and Trunks", Pages 96-98, "VLAN Membership"Ch4 "VLANs and Trunks", Page 99, (Referencing Example 4-2)
"best practices" notes are embedded throughout the chapterCh4 "VLANs and Trunks", Pages 112-116, "Voice VLANs"Ch4 "VLANs and Trunks", Pages 117-118, "Wireless VLANs"Topic HeaderCh5 "VLAN Trunking Protocol" Page 127, "VLAN Trunking Protocol" and "VTP Domains"Ch5 "VLAN Trunking Protocol" Pages 127-128, "VTP Modes"Ch5 "VLAN Trunking Protocol" Pages 133-134, "Configuring the VTP Version"Ch5 "VLAN Trunking Protocol" Pages 138-140, "VTP Pruning"
Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP Advertisements"
Ch5 "VLAN Trunking Protocol" Pages 132-138, "VTP Configuration"
Ch4 "VLANs and Trunks", Page 98, (In text starting with "Next, you should assign)Ch4 "VLANs and Trunks", Pages 106-110, "VLAN Trunk Configuration"Ch4 "VLANs and Trunks", Pages 110-112, "Troubleshooting VLANs and Trunks
-
"Best Practices" notes are embedded throughout the chapterTopic HeaderCh10 "Aggregating Switch Links", Pages 245-247, "Switch Port Aggregation with EtherChannel"Ch10 "Aggregating Switch Links", Page 251, "EtherChannel Negotiation Protocols"Ch10 "Aggregating Switch Links", Page 252, "Link Aggregation Control Protocol"Ch10 "Aggregating Switch Links", Page 252, "Port Aggregation Protocol"
Ch10 "Aggregating Switch Links", Pages 247-249, "Distributing Traffic in EtherChannel"Topic Header
Ch10 "Aggregating Switch Links", Pages 255-257, "Avoiding Misconfiguration with EtherChannel Guard"
Topic HeaderTopic Header
Ch 6 "Traditional Spanning Tree Protocol", pages 156-158, "Electing a Root Bridge"Ch 6 "Traditional Spanning Tree Protocol", pages 158-160, "Electing a Root Port"Ch 6 "Traditional Spanning Tree Protocol", pages 160-162, "Electing Designated Ports"Ch 6 "Traditional Spanning Tree Protocol", pages 162-165, "STP States"Ch 6 "Traditional Spanning Tree Protocol", pages 172-174, "Types of STP"Ch 6 "Traditional Spanning Tree Protocol", pages 167-172, "Topology Changes"Ch 9 "Advanced Spanning Tree Protocol", Page 223, "Rapid Spanning Tree Protocol"
Ch 9 "Advanced Spanning Tree Protocol", Page 229, "Topology Changes and RSTP"
Ch 7 "Spanning-Tree Configuration", Pages 181-184, "STP Root Bridge"Ch 7 "Spanning-Tree Configuration", Pages 184-188, "Root Bridge Configuration"Ch 7 "Spanning-Tree Configuration", Pages 188-191, "Spanning-Tree Customization"
Ch 7 "Spanning-Tree Configuration", Pages 191-194, "Tuning Spanning-Tree Convergence"Topic Header
Ch 7 "Spanning-Tree Configuration", Pages 196-197, "UplinkFast: Access Layer Uplinks"
Ch 7 "Spanning-Tree Configuration", Pages 197-198, "BackboneFast: Redundant Backbone Paths"
Ch10 "Aggregating Switch Links", Pages 253-255, "EtherChannel Configuration"Ch10 "Aggregating Switch Links", Pages 249-251, "Configure EtherChannel Load Balancing"
Ch 6 "Traditional Spanning Tree Protocol", pages 155-156, "Spanning-Tree Communication: Bridge Protocol Data Units"
Ch 9 "Advanced Spanning Tree Protocol", Page 224 (In text Starting with "The root bridge in a network")
-
Ch 7 "Spanning-Tree Configuration", Pages 194-196, "PortFast: Access Layer Nodes"
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 208-209, "BPDU Guard"
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 207-208, "Root Guard"
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages210-211, "Loop Guard"
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 211-213, "UDLD"
(Not mentioned in Cert Guide)
Ch 9 "Advanced Spanning Tree Protocol", Pages 234-236, "Spanning-Tree Instances Within MST"
(Not mentioned in Cert Guide)
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages 213-214, "Using BPDU Filtering to Disable STP on a Port"
-
(Not mentioned in Cert Guide)
Topic HeaderTopic HeaderCh 11 "Multilayer Switching", Page 268, "InterVLAN Routing"
Cert Guide does not detail InterVLAN Routing using an External Router; This is a CCNA-Level Task
Cert Guide does not detail InterVLAN Routing using an External Router; This is a CCNA-Level Task
Cert Guide does not detail InterVLAN Routing using an External Router; This is a CCNA-Level Task
Cert Guide does not detail InterVLAN Routing using an External Router; This is a CCNA-Level Task
Ch 11 "Multilayer Switching", Page 269-270, " Configuring InterVLAN Routing"
Topic Header
Topic Header
Ch 11 "Multilayer Switch", Pages 280-284, "Verifying Multilayer Switching"Ch 11 "Multilayer Switch", Page 272, (In text Starting with "Be aware that an SVI")
(L3 EtherChannel not mentioned)
Topic HeaderCh 12 "Configuring DHCP", Pages 293-294, "Configuring an IPv4 DHCP Server"Ch 12 "Configuring DHCP", Pages 296, "Configuring DHCP Relay"Ch 12 "Configuring DHCP", Pages 296, "Configuring DHCP Options"
Topic Header in Certification Guide Ch 13, Layer 3 High Availability, "Hot Standby Router Protocol", Page 385
Ch 11 "Multilayer Switching", Pages 268-269, "Types of Interfaces"Ch 11 "Multilayer Switching", Pages 270-272, (In text starting with "Layer 2 Port Configuration")
-
Ch 13, Layer 3 High Availability, "HSRP Router Election", Page 386
Ch 13, Layer 3 High Availability,"HSRP Gateway Addressing" , Page 390
Ch 13, Layer 3 High Availability,"Load Balancing with HSRP", Page 391Ch 13, Layer 3 High Availability,"Conceding the Election", Page 389 Ch 13, Layer 3 High Availability,Conceding the Election, Page 389 Not covered in the Certification Guide
Not covered in the Certification Guide Not covered in the Certification Guide Ch 13, Layer 3 High Availability,"VRRP", Pages 394 -396Ch 13, Layer 3 High Availability,"VRRP", Page 394Not covered in the Certification Guide Ch 13, Layer 3 High Availability,"VRRP", Page 394
Not covered in the Certification Guide
Not covered in the Certification Guide Ch 13, Layer 3 High Availability,"GLBP", Page 397Not covered in the Certification Guide
Chapter 13, Layer 3 High Availability,"GLBP Load Balancing" , Page 400
Not covered in the Certification Guide
Not covered in the Certification Guide
Not covered in the Certification Guide
Ch 19, Securing Switch Access, "AAA", Page 464
Ch 19, Securing Switch Access,TACACS+ and RADIUS, Page 464 Ch 19, Securing Switch Access,TACACS+ and RADIUS, Page 464 Ch 19, Securing Switch Access,TACACS+ and RADIUS, Page 464 Ch 19, Securing Switch Access,Configuring Authentication, Page 465-471 Ch 19, Securing Switch Access,Configuring Authentication, Page 467
Not addressed in FLG version 7.0
Ch 13, Layer 3 High Availability,"Plain Text Authentication", Page 388 ," MD5 Authentication", Page 388,
Ch13, Layer 3 High Availability,"Active Virtual Gateway", P age 397Ch 13, Layer 3 High Availability,"Active Virtual Forwarder", Page 398
-
Ch 19, Securing Switch Access,Port Based Auentication, Page 418 Ch 19, Securing Switch Access,802.1x Configuration, Page 419 -421
Ch 13, Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source, Page 313
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 313 Ch 13, "Logging Switch Activity: Setting the Internal System Clock", page 312
Ch13,"Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 313
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 314
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 314
Ch 13, "Logging Switch Activity:Securing NTP", Page 316
Ch 13, "Logging Switch Activity", "Using NTP to Synchronize with an External Time Source", Page 313 Not covered in the Certification Guide
Ch 13, "Logging Switch Activity:Using SNTP to Synchronize Time", Page 316
Not covered in the Certification Guide
Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 324Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 324Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 325Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 325Cha 14: Managing Switches with SNMP,Configuring SNMPv3, Page 328 Not covered in the Certification Guide
Ch 3: Switch Port ConfigurationCh 3: Switch Port Configuration, "Link Layer Discover Protocol", Page 75Ch 3: Switch Port Configuration, "Link Layer Discover Protocol", Page 75-76Ch 3: Switch Port Configuration, "Link Layer Discover Protocol", Page 75-76Ch 8: Protecting the Spanning-Tree Topology, "UDLD", Page 211
Ch 8: Protecting the Spanning-Tree Topology, "UDLD", Page 211 Ch 8: Protecting the Spanning-Tree Topology, "UDLD", Page 211
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 315, Example 13-1 and 13-2Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with an External Time Source", Page 314, Figure 13-3 addresses NTP Hierarchy
-
Ch 8: Protecting the Spanning-Tree Topology, UDLD, Page 216
Ch 3: Switch Port Configuration, "Using Power over Ethernet", Page 77 Ch 3: Switch Port Configuration,Ch 3: Switch Port Configuration,How PoE Works, Page 78Ch 3: Switch Port Configuration,Detecting a Powered Device, Page 79
Ch 2: Switch Operation, "Managing Switching Table Sizes", Page 49Ch 2: Switch Operation, "Managing Switching Table Sizes", Page 50-51Ch 2: Switch Operation,
Not covered in the Certification Guide
Ch 16: Using Port Mirroring to Monitor Traffic: "Using Port Mirrorring to Monitor Traffic", Page 349-362
Ch 16: Using Port Mirroring to Monitor Traffic, "Local Span Configuration", Page 354
Ch 16: Using Port Mirroring to Monitor Traffic "Remote SPAN", Page 357Ch 15: Monitoring Performance with IP SLA, Page 333-346Ch 15: Monitoring Performance with IP SLA, "IP SLA Overview", Page 336 Ch 15: Monitoring Performance with IP SLA "IP SLA Overview", Page 337Ch 15: Monitoring Performance with IP SLA, "Configuring IP SLA", Plage 338
Ch 15: Monitoring Performance with IP SLA "Configuring IP SLA" , Plage 339Ch 15: Monitoring Performance with IP SLA "Configuring IP SLA" , Plage 339No specific example in Certification Guide
Ch 17: Understanding High AvailabilityCh 17: Understanding High Availability, "Leveraging Logical Switches", Page 368
Ch 17: Understanding High Availability, "Stackwise", Page 371 Ch 17: Understanding High Availability, "Stackwise", Page 372Not covered in the Certification Guide Ch 17: Understanding High Availability, "Virtual Switching System", Page 372 Virtual Switching System, Page 372
Not covered in the Certification Guide
Ch 3: Switch Port Configuration,Configuring PoE, Page 80Verifying PoE, Page 81
Ch 16: Using Port Mirroring to Monitor Traffic, "Foundation Topics", Page 352-354, Remote SPAN, Page 356
Ch 15: Monitoring Performance with IP SLA, " Configuring IP SLA", Page 339
-
Ch 17: Understanding High Availability, "Supervisor and Route Processor Redundancy" Page 373- 379
Ch 17: Understanding High Availability "Configuring the Redundancy Mode", Page 374
Ch 17: Understanding High Availability, "Redundant Switch Supervisors", Page 373
Ch 17: Understanding High Availability,"Nonstop Forwarding", Page 377
Cisco Switch Recommended Security Configuration Best PracticesCh 19: Securing Switch Access, "Part VII: Securing Switched Networks", Page 411
Not covered in the Certification Guide
Not covered in the Certification Guide
Not covered in the Certification Guide
Ch 19: Securing Switch Access, "Port Security", Page 415
Ch 19: Securing Switch Access, "Port Security", Page 415 -416Ch 3: Switch Port Configuration, "Managing Error Conditions on a Switch Port", Page 69-71 Ch 3: Switch Port Configuration, "Managing Error Conditions on a Switch Port", Page 71
Not covered in the Certification Guide Ch 19: Securing Switch Access, "Using Storm Control", Page 421-423
Ch 19: Securing Switch Access, "Using Storm Control", Page 421-422Ch 19: Securing Switch Access, "Using Storm Control", Page 423Prevent Spoofing Attacks, Page 449-459
Not covered in the Certification Guide
Ch 21: Preventing Spoofing Attacks, "DHCP Snooping", Page 451
Ch 21: Preventing Spoofing Attacks, "DHCP Snooping", Page 452-453
-
Ch 21: Preventing Spoofing Attacks, "DHCP Snooping" Page 452-453
Ch 21: Preventing Spoofing Attacks, "IP Source Guard", Page 453-455Ch 21: Preventing Spoofing Attacks, "IP Source Guard", Page 454-455
Ch 21: Preventing Spoofing Attacks, "Dynamic Arp Inspection", Page 455
Ch 21: Preventing Spoofing Attacks, "Dynamic Arp Inspection", Page 455Ch 21: Preventing Spoofing Attacks, "Dynamic Arp Inspection", Page 456-457Ch 20: Securing VLANs Page 431-448
Ch 20: Securing VLANs, "Switching Spoofing", Page 441 Ch 20: Securing VLANs, "VLAN Hopping", Page 443
Not covered in the Certification Guide
Ch 20: Securing VLANs "VLAN Access Lists", Page 435
Not covered in the Certification Guide
Ch 20: Securing VLANs "VLAN Access Lists", Page 436
Ch 20: Securing VLANs, Page 436-441Ch 20: Securing VLANs "Private VLANs", Page 436-437Ch 20: Securing VLANs "Private VLANs", Page 436-437Ch 20: Securing VLANs, "Private VLAN Configuration", Page 438 -441, Configuration Example 20-2Not covered in the Certification Guide Not covered in the Certification Guide
Not covered in the Certification Guide
-
Additional References and Notes
Important Note: This content mapping was created using the available draft chapters of the SWITCH Foundation Learning Guide (300-115), and may not be accurate with relation to the book when
From *DRAFT* FLG Chapter: If you have a very good understanding of switching terminology and a basic comprehensive of switching technology, you may want to skip this chapter and begin on Chapter 2."In summary, this chapter covers the following basic switching topics as a review to CCNA and serves a teaser for topics covered later in chapter"
Also see Cisco Validated Designs: Campus Design Summary: http://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2014/CampusDesignSummary-AUG14.pdf and Campus Wired LAN Design Guide: http://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2014/CVD-CampusWiredLANDesignGuide-AUG14.pdf
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 216-217, "Explaining Layer 3 Switch Processing"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 220-221, "Distributed Hardware Forwarding"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 222-225, (Starting at "This section discusses the multilayer switching forwarding methods")
-
Covers Add/Change/Delete of VLANs switchport host command
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 224-225, ("CEF can occur at following two different locations on the switch:")Note: *DRAFT* FLG has limited coverage of CEF; use SWITCH FLG v6 Pages 215-237 and/or Cert Guide Chapter 11 Pages 272-280 for full coverage
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 56-57, "Comparison of End-to-End and Local VLANs"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 57-58, "Mapping VLANs to a Hierarchical Network"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 71-72, "Understanding Native VLAN in 802.1Q trunking"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 72-73, "Understanding DTP"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 72-73, "Understanding DTP"SWITCH Foundation Learning Guide (v6 - 642-813), Page 61, "VLAN Ranges"
Assignment of a port to a VLAN, Verifying VLAN database contents and port assignments, Configuring a Trunk.SWITCH Foundation Learning Guide (v6 - 642-813), Pages 59-60, "Best Practices for VLAN design" and Pages 73-74 "Best Practices for Trunking"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 84, "VTP Authentication"VTPv1 & 2 Password Configuration: 3560 Software Configuration Guide: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swvtp.html#wp1035165VTPv3 Password Configuration: 3560 Software Configuration Guide http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swvtp.html#wp1312545
VTPv3: 3560 Software Configuration Guide: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swvtp.htmlVTPv3: Catalyst 6500 Series Switches: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/solution_guide_c78_508010.html
-
SWITCH Foundation Learning Guide (v6 - 642-813), Page 84, "Best Practices for VTP Implementation"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 105-106, "Configure Port Channels using EtherChannel"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 122-123, "STP Operation"
Note: *DRAFT* FLG paragraph highlights the PVST+ fields Bridge Priority, Extended System ID, and MAC Address
Note: *DRAFT* FLG uses same introduction paragraph as SWITCH Foundation Learning Guide (v6 - 642-813), Pages 125-126, "Rapid Spanning Tree Protocol"Also see Cisco.Com "Understanding Rapid Spanning Tree Protocol":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24062-146.htmlSWITCH Foundation Learning Guide (v6 - 642-813), Pages 127-128, "RSTP Port Roles"SWITCH Foundation Learning Guide (v6 - 642-813), Page 129, Table 3-5, "802.1D and 802.1w Port Type and Port State Comparison"Note: Cert Guide provides very good coverage of RSTP Convergence between pages 225-229. This information is not present in the *DRAFT* FLGSWITCH Foundation Learning Guide (v6 - 642-813), Pages 129-130, "Rapid Transition to Forwarding"
Timers":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/19120-122.html
Configuring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.html
-
Configuring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring Optional Spanning-Tree Features: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.html
Configuring UDLD: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swudld.htmlSee Cisco.Com "Best Practices for UniDirectional Link Detection (UDLD)":http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/best/practices/recommendations.html#wp1050563SWITCH Foundation Learning Guide (v6 - 642-813), Pages 166-167, "Flex Links"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 168-171, "Recommended Spanning Tree Practices"SWITCH Foundation Learning Guide (v6 - 6642-813), Page 141, "Multiple Spanning Tree" (First paragraph)SWITCH Foundation Learning Guide (v6 - 642-813), Pages 141-143, "Multiple Spanning Tree"Also see Cisco.Com "Understanding Multiple Spanning Tree Protocol":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24248-147.htmlSWITCH Foundation Learning Guide (v6 - 642-842), Pages 143-144, "MST Regions"
SWITCH Foundation Learning Guide (v6 - 642-842), Page 144, "Extended System ID for MST"SWITCH Foundation Learning Guide (v6 - 642-842), Page 145-150, "Configuring MST"Configuring MSTP: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swmstp.htmlAlso see Cisco.Com "VTPv3 and MST: Catalyst 6500 Series Switches": http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/solution_guide_c78_508010.htmlConfiguring MSTP: Configuring Path Cost: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swmstp.html#wp1039394Configuring MSTP: Configuring Port Priority: 3560 Software Configuration Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swmstp.html#wp1039280See Cisco.Com "Configuration example to migrate Spanning Tree from PVST+ to MST":http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/72844-MST.htmlAlso see Cisco.Com "Understanding Multiple Spanning Tree Protocol":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24248-147.html
-
Cisco.Com "Understanding Multiple Spanning Tree Protocol":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24248-147.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 195-197, "Inter_VLAN Configuration with External Router"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 186-189, "Inter-VLAN Routing Using an External Router (Router-on-a-Stick)"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 189-190, "External Router: Advantages and Disadvantages"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 190-192, "Inter-VLAN Routing Using Switch Virtual Interfaces"SWITCH Foundation Learning Guide (v6 - 642-813), Page 192, "SVI: Advantages and Disadvantages"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 193, "Routed Port: Advantages and Disadvantages"This section is a step-by-step walk through of configuring InterVLAN Routing using SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages 197-199This section is a step-by-step walk through of configuring InterVLAN Routing using SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages 197-199This section is a step-by-step walk through of configuring InterVLAN Routing using SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages 197-199SWITCH Foundation Learning Guide (v6 - 642-813), Pages 199-200, "SVI Autostate"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 197-198, "Inter-VLAN Configuration with SVI: Implementation Plan"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 204-206, " Troubleshooting Inter-VLAN Problems"
Configuring EtherChannels: 3560 Software Configuration Guide: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swethchl.htmlSWITCH Foundation Learning Guide (v6 - 642-813), Pages 206-208, "Configuration of Layer 3 EtherChannel"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 208-210, "Routing Protocol Configuration" and "Verifying Routing Protocol"
chapter 12 "Configuring DHCP", pages 297-299, "Configuring DHCP to support IPv6"Also - Cisco Documentation - IOS IPv6 Configuration Guide for IOS release 15.2M&Thttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/15-SWITCH Foundation Learning Guide (v6 - 642-813), Pages 288 , Chapter 5: Implementing High Availability and Redundancy in a Campus Network, "First Hop Redunandcy Protocols
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 244- , Chapter 5 Implementing High Availability and Redundancy in a Campus Network"
-
SWITCH Foundation Learning Guide (v6 - 642-813), Page 309-310,"VRRP"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 309-310,"VRRP"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 296, "HSRP Active Router and Spanning Tree Topology"SWITCH Foundation Learning Guide (v6 - 642-813), Page 296, "Configuring HSRP" SWITCH Foundation Learning Guide (v6 - 642-813), Page 296, "Configuring HSRP"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 302-304 "HSRP Interface Tracking, HSRP Object Tracking, HSRP and IP SLA Tracking"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 302-304 "HSRP Interface Tracking, HSRP Object Tracking, HSRP and IP SLA Tracking"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 302-304 "HSRP Interface Tracking, HSRP Object Tracking, HSRP and IP SLA Tracking"SWITCH Foundation Learning Guide (v6 - 642-813), Page 298, "HSRP Authentication"SWITCH Foundation Learning Guide (v6 - 642-813), Page 299-301, "HSRP Timers Considerations and Configuration"SWITCH Foundation Learning Guide (v6 - 642-813), Page 301, "HSRP Versions"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 312-315, " Configure VRRP"
VRRP Authenticationhttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/12-4/fhp-12-4-book/fhp-vrrp.htmlVRRP Trackinghttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/12-4/fhp-12-4-book/fhp-vrrp.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 316, "Table 5-11, Comparison between HSRP and GLBP"
Configuring GLBPhttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp-glbp.htmlConfiguring GLBPhttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp-glbp.htmlConfiguring GLBPhttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp-glbp.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 262-272, Chapter 5: Implementing High Availability, " Implementing Network Monitoring"
Compare RADUIS and TACACS+http://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13838-10.html
-
Not covered in detail in CCNP:SWITCH v.6.0
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 387-390, " Security Using IEEE 802.1x Port-Based Authentication"
"What's new in Version 4"http://www.ntp.org/ntpfaq/NTP-s-def.htm#Q-DEF-OV-V4NEWSImplementing NTPv4 in IPv6http://www.cisco.com/c/en/us/td/docs/ios/ipv6/configuration/guide/12_4t/ipv6_12_4t_book/ip6-ntpv4.html
IEEE Standard for A Precison Clock Synchronization Protocol http://www.nist.gov/el/isd/ieee/ieee1588.cfmSecuring Simple Network Management Protocol, Document ID: 20370, www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094489.shtml
Verifying SNMPv3http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe-3se/3850/snmp-xe-3se-3850-book/nm-snmp-snmpv3.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 373-376, " Neighbor Discovery Protocols"
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swudld.html
-
Not covered in CCNP:SWITCH v.6.0
Not covered in CCNP:SWITCH v.6.0
LoopGuard versus UDLDhttp://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10596-84.htmlSWITCH Foundation Learning Guide (v6 - 642-813), Pages 491-493, "Power over Ethernet"
Consult www.cisco.com product configuration guide for guidance on SDM Configuration for a specific platform.
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 398-410, Chapter 6: Securing the Campus Infrastructure " Troubleshooting Performance and Connectivity"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 402, Chapter 6: Securing the Campus Infrastructure "Monitoring Performance with SPAN and VSPAN "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 404-408, Chapter 6: Securing the Campus Infrastructure "Monitoring Performance RSPAN "SWITCH Foundation Learning Guide (v6 - 642-813), Pages 273-280 , Chapter 5: Implementing High Availability and Redundancy in a Campus Network "IP SLA"
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swipsla.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 259-260 , Chapter 5: Implmenting High Availability, "StackWise Access Switches"
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/15-1-2/XE_340/configuration/guide/config/vss.html#wp1060337http://www.cisco.com/c/dam/en/us/products/collateral/interfaces-modules/network-modules/white_paper_c11_429338.pdf
-
SWITCH Foundation Learning Guide (v6 - 642-813), Pages280 , Chapter 5: Implementing High Availability and Redundancy in a Campus Network "Implementing Redundant Supervisor Engines in Catalyst Switches"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 281 , Chapter 5: Implementing High Availability and Redundancy in a Campus Network, "Route Process Redundancy"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 284 , Chapter 5: Implementing High Availability and Redundancy in a Campus Network, "Stateful Switchover (SSO)"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 284 , Chapter 5: Implementing High Availability and Redundancy in a Campus Network, "Stateful Switchover (SSO)"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 333-416 ,Chapter 6: Securing the Campus Infrastructure
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 333-416 ,Chapter 6: Securing the Campus Infrastructure " Switch Security Fundamentals" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 390-397 , "Switch Security Considerations. "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 336 "Unauthorized Access by Rogue Devices" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 362 "Table 6-1 Switch Security Attacks and Mitigation Steps" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 338 "Understanding and Protecting Against MAC Layer Attack" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 341 "Port Security" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 343 "Port Security"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352 "VLAN Access Control Lists" Configuring Port Based Traffic Control: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swtrafc.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 356 "DHCP Spoofing Attack" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 358 "DHCP Snooping " SWITCH Foundation Learning Guide (v6 - 642-813), Pages 359 "DHCP Snooping "
-
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 368 "IP Spoofing and IP Source Guard "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 361 "Arp Spoofing Attack " SWITCH Foundation Learning Guide (v6 - 642-813), Pages 362 "Arp Spoofing Attack "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 350 "VLAN Hopping "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 351-352 "Mitigating Against VLAN Hopping"SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352 "VLAN Access Control Lists" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352-355 "VLAN Access Control Lists" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352-355 "VLAN Access Control Lists" SWITCH Foundation Learning Guide (v6 - 642-813), Chapter 2: Implementing VLANs in Campus Networks, Page 87-97, "Private VLANs"
SWITCH Foundation Learning Guide (v6 - 642-813), Chapter 2: Implementing VLANs in Campus Networks, Page 121, "Port Protected Feature"
Lesson Map