&atext-align=left align=left>Chapter 1 LAN Design 1
Objectives 1
Key Terms 1
Switched LAN Architecture 2
The Hierarchical Network Model 2
<i>
Access Layer 2
Distribution Layer 3
Core Layer 3
A Hierarchical Network in a Medium-Sized Business 4
Benefits of a Hierarchical Network 4
</i>
Principles of Hierarchical Network Design 6
<i>
Network Diameter 7
Bandwidth Aggregation 8
Redundancy 9
</i>
What Is a Converged Network? 10
<i>
Legacy Equipment 10
Advanced Technology 11
New Options 12
Separate Voice, Video, and Data Networks 13
</i><b>
Matching Switches to Specific LAN Functions 15
</b>
Considerations for Hierarchical Network Switches 15
<i>
Traffic Flow Analysis 15
User Community Analysis 17
Data Stores and Data Servers Analysis 19
Topology Diagrams 20
</i>
Switch Features 22
<i>
Switch Form Factors 22
Switch Performance 24
Power over Ethernet and Layer 3 Functionality 26
</i>
Switch Features in a Hierarchical Network 28
<i>
Access Layer Switch Features 28
Distribution Layer Switch Features 30
Core Layer Switch Features 31
</i>
Switches for Small and Medium Sized Business (SMB) 33
<i>
Catalyst Express 500 33
Catalyst 2960 34
Catalyst 3560 35
Catalyst 3750 36
</i><i>
Catalyst 4500 36
Catalyst 4900 37
Catalyst 6500 38
Comparing Switches 39
</i><b>
Summary 40
Labs 40
Check Your Understanding 41
Challenge Questions and Activities 44
Chapter 2 Basic Switch Concepts and Configuration 45
Objectives 45
Key Terms 45
Introduction to Ethernet/802.3 LANs 46
</b>
Key Elements of Ethernet/802.3 Networks 46
<i>
CSMA/CD 46
Ethernet Communications 47
Duplex Settings 49
Switch Port Settings 50
Switch MAC Address Table 51
</i>
Design Considerations for Ethernet/802.3 Networks 52
<i>
Bandwidth and Throughput 52
Collision Domains 53
Broadcast Domains 54
Network Latency 54
Network Congestion 55
LAN Segmentation 55
</i>
LAN Design Considerations 56
<b>
Forwarding Frames Using a Switch 58
</b>
Switch Forwarding Methods 59
Symmetric and Asymmetric Switching 60
Memory Buffering 60
Layer 2 and Layer 3 Switching 62
<b>
Switch Management Configuration 63
</b>
Navigating Command-Line Interface Modes 63
<i>
GUI-Based Alternatives to the CLI 65
</i>
Using the Help Facility 68
Accessing the Command History 70
Switch Boot Sequence 71
Prepare to Configure the Switch 72
Basic Switch Configuration 72
<i>
Management Interface 73
Default Gateway 74
Duplex and Speed 75
HTTP Access 76
MAC Address Table Management 77
</i>
Verifying Switch Configuration 78
Basic Switch Management 80
<i>
Backing Up and Restoring Switch Configuration Files 80
Using a TFTP Server with Switch Configuration Files 82
Clearing Switch Configuration Information 84
</i><b>
Configuring Switch Security 85
</b>
Configuring Password Options 85
<i>
Securing Console Access 85
Securing Virtual Terminal Access 87
Securing Privileged EXEC Access 88
Encrypting Switch Passwords 89
Password Recovery 90
</i>
Login Banners 92
Configure Telnet and SSH 93
<i>
Configuring Telnet 93
Configuring SSH 94
</i>
Common Security Attacks 96
<i>
MAC Address Flooding 96
Spoofing Attacks 100
CDP Attacks 101
Telnet Attacks 102
</i>
Security Tools 103
Configuring Port Security 105
Securing Unused Ports 110
<b>
Summary 111
Labs 111
Check Your Understanding 112
Challenge Questions and Activities 117
Chapter 3 VLANs 121
Objectives 121
Key Terms 121
Introducing VLANs 122
</b>
Defining VLANs 122
Benefits of VLANs 124
VLAN ID Ranges 126
Types of VLANs 126
Voice VLANs 131
Network Application Traffic Types 133
Switch Port Membership Modes 136
Controlling Broadcast Domains with VLANs 138
<b>
VLAN Trunking 143
</b>
VLAN Trunks 144
<i>
IEEE 802.1Q Frame Tagging 145
Native VLANs 147
</i>
Trunking Operation 148
Trunking Modes 149
<b>
Configure VLANs and Trunks 151
</b>
Configure a VLAN 152
Managing VLANs 155
<i>
Managing VLAN Memberships 158
</i>
Configure a Trunk 160
<b>
Troubleshooting VLANs and Trunks 164
</b>
Common Problems with Trunks 165
A Common Problem with VLAN Configurations 171
<b>
Summary 173
Labs 173
Check Your Understanding 174
Challenge Questions and Activities 178
Chapter 4 VTP 181
Objectives 181
Key Terms 181
VTP Concepts 182
</b>
What Is VTP? 182
<i>
Benefits of VTP 184
VTP Components 184
</i><b>
VTP Operation 186
</b>
Default VTP Configuration 186
VTP Domains 188
VTP Advertising 190
<i>
VTP Configuration Revision Number 192
VTP Advertisement Types 193
</i>
VTP Modes 197
<i>
VTP Server-to-Client Behavior 198
VTP Server-to-Transparent-to-Client Behavior 199
</i>
VTP Pruning 201
<i>
VTP Pruning in Action 202
</i><b>
Configure VTP 204
</b>
Configuring VTP 204
<i>
Steps to Configuring VTP 206
</i>
Troubleshooting VTP Configurations 212
<i>
Incompatible VTP Versions 212
VTP Password Issues 212
Incorrect VTP Domain Name 213
All Switches Set to VTP Client Mode 214
VTP Troubleshooting Example 215
</i>
Managing VLANs on a VTP Server 217
<b>
Summary 219
Labs 219
Check Your Understanding 220
Challenge Questions and Activities 224
Chapter 5 STP 227
Objectives 227
Key Terms 227
Redundant Layer 2 Topologies 229
</b>
Redundancy 229
Issues with Redundancy 234
<i>
Broadcast Storms 238
Duplicate Unicast Frames 240
</i>
Real-World Redundancy Issues 241
<i>
Loops in the Wiring Closet 242
Loops in Cubicles 243
</i><b>
Introduction to STP 244
</b>
Spanning-Tree Algorithm (STA) 244
<i>
STP Topology 245
Port Types in the Spanning-Tree Algorithm 247
Root Bridge 248
Best Paths 249
</i>
STP BPDU 252
<i>
BPDU Process 253
</i>
Bridge ID 258
<i>
Configure and Verify the BID 261
</i>
Port Roles 263
<i>
Configure Port Priority 265
Port Role Decisions 266
</i>
STP Port States and BPDU Timers 268
<i>
Cisco PortFast 271
</i><b>
STP Convergence 273
</b>
Step 1. Elect a Root Bridge 273
<i>
Verify Root Bridge Election 274
</i>
Step 2. Elect Root Ports 276
<i>
Verify Root Port Election 278
</i>
Step 3. Elect Designated and Nondesignated Ports 279
<i>
Verify Designated and Nondesignated Port Election 283
</i>
STP Topology Change 285
<b>
PVST+, RSTP, and Rapid PVST+ 286
</b>
Cisco and IEEE STP Variants 287
<i>
Per-VLAN Spanning-Tree (PVST) Overview 287
Per-VLAN Spanning-Tree Plus (PVST+) Overview 287
Rapid Spanning-Tree Protocol (RSTP) Overview 288
Multiple Spanning-Tree Protocol (MSTP) Overview 288
</i>
PVST+ 288
<i>
Configure PVST+ 291
</i>
RSTP 294
<i>
RSTP BPDU 295
</i>
Edge Ports 296
Link Types 297
RSTP Port States and Port Roles 298
<i>
RSTP Proposal and Agreement Process 301
</i>
Configuring Rapid PVST+ 309
Design STP for Trouble Avoidance 312
<i>
Minimize the Number of Blocked Ports 313
Use Layer 3 Switching 314
Keep STP Even if It Is Unnecessary 316
Keep Traffic off of the Management VLAN 316
</i>
Troubleshoot STP Operation 316
<i>
PortFast Configuration Error 317
Network Diameter Issues 318
</i><b>
Summary 320
Labs 320
Check Your Understanding 321
Challenge Questions and Activities 327
Chapter 6 Inter-VLAN Routing 331
Objectives 331
Key Terms 331
Inter-VLAN Routing 332
</b>
Introducing Inter-VLAN Routing 332
<i>
One-Router-Interface-per-VLAN 332
Router-on-a-Stick 334
Layer 3 Switch 336
</i>
Interfaces and Subinterfaces 337
<i>
One-Router-Interface-per-VLAN 338
Router-on-a-Stick 341
Considerations for Inter-VLAN Routing Methods 345
</i><b>
Configuring Inter-VLAN Routing 347
</b>
Configure Inter-VLAN Routing 347
Configure Router-on-a-Stick Inter-VLAN Routing 351
<b>
Troubleshooting Inter-VLAN Routing 356
</b>
Switch Configuration Issues 356
<i>
Switch Cisco IOS Commands for Troubleshooting 359
</i>
Router Configuration Issues 360
<i>
Router Cisco IOS Commands for Troubleshooting 361
</i>
IP Addressing Issues 362
<i>
IP Addressing Cisco IOS Verification Commands 364
</i><b>
Summary 366
Labs 366
Check Your Understanding 367
Challenge Questions and Activities 373
Chapter 7 Basic Wireless Concepts and Configuration 377
Objectives 377
Key Terms 377
The Wireless LAN 379
</b>
Why Use Wireless? 379
<i>
Wireless LANs 380
Comparing a WLAN to a LAN 381
Wireless LAN Components 383
</i>
Wireless LAN Standards 383
<i>
Wi-Fi Certification 386
</i>
Wireless Infrastructure Components 387
<i>
Wireless NICs 387
Wireless Access Points 388
Wireless Routers 390
</i>
Wireless Operation 391
<i>
Configurable Wireless Parameters 391
Wireless Topologies 393
Wireless Association 396
</i>
Planning the Wireless LAN 399
<b>
Wireless LAN Security 402
</b>
Threats to Wireless Security 402
<i>
Rogue Access Points 402
Man-in-the-Middle Attacks 403
Denial of Service 404
</i>
Wireless Security Protocols 405
<i>
Authenticating the Wireless LAN 407
Wireless Encryption 408
Controlling Access to the WLAN 409
</i><b>
Configure Wireless LAN Access 410
</b>
Configuring the Wireless Access Point 410
<i>
Configuring Basic Wireless Settings 413
Configuring Wireless Security 415
</i>
Configuring a Wireless NIC 418
<i>
Scan for SSIDs 418
Select the Wireless Security Protocol 420
Verify Connectivity to the WLAN 423
</i><b>
Troubleshooting Simple WLAN Problems 424
</b>
A Systematic Approach to WLAN Troubleshooting 424
Solve Access Point Radio and Firmware Issues 426
Channel Settings 426
RF Interference 429
Access Point Placement 431
Authentication and Encryption 434
<b>
Summary 436
Labs 436
Check Your Understanding 437
Challenge Questions and Activities 441
</b><b>
Appendix Check Your Understanding and Challenge Questions
Answer Key 445
Glossary 461
</b>