Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide

Book description

Now fully updated for the new Cisco SWITCH 300-115 exam, Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide is your Cisco® authorized learning tool for CCNP® or CCDP® preparation. Part of the Cisco Press Foundation Learning Series, it teaches you how to plan, configure, verify, secure, and maintain complex enterprise switching solutions using Cisco Catalyst® switches and Enterprise Campus Architecture.

The authors show you how to build scalable multilayer switched networks, create and deploy global intranets, and perform basic troubleshooting in environments using Cisco multilayer switches for client hosts and services. They begin by reviewing basic switching concepts, network design, and campus network architecture. Next, they present in-depth coverage of spanning-tree, inter-VLAN routing, first-hop redundancy, network management, advanced switch features, high availability, and campus network security.

Each chapter opens with a list of topics that clearly identify its focus. Each chapter ends with a summary of key concepts for quick study, as well as review questions to assess and reinforce your understanding. Throughout, configuration examples, and sample verification outputs illustrate critical issues in network operation and troubleshooting.

This guide is ideal for all certification candidates who want to master all the topics covered on the SWITCH 300-115 exam.

  • Serves as the official textbook for version 7 of the Cisco Networking Academy CCNP SWITCH course
  • Covers basic switching terminology and concepts, and the unique features of Cisco Catalyst switch designs
  • Reviews campus network design, including network structure, roles of Cisco Catalyst switches, and differences between Layer 2 and multilayer switches
  • Introduces VLANs, VTP, Trunking, and port-channeling
  • Explains Spanning Tree Protocol configuration
  • Presents concepts and modern best practices for interVLAN routing
  • Covers first-hop redundancy protocols used by Cisco Catalyst switches
  • Outlines a holistic approach to network management and Cisco Catalyst device security with AAA, NTP, 802.1x, and SNMP
  • Describes how to use advanced features to improve campus network resiliency and availability
  • Shows how to establish switch physical redundancy using Stackwise, VSS, or redundant supervisors
  • Explains advanced security features

*The companion material is not available with the online edition on O'Reilly Learning

Table of contents

  1. About This eBook
  2. Title Page
  3. Copyright Page
  4. About the Authors
  5. About the Technical Reviewer
  6. Dedications
  7. Acknowledgments
  8. Contents at a Glance
  9. Contents
  10. Icons Used in This Book
  11. Command Syntax Conventions
  12. Introduction
    1. Who Should Read This Book?
    2. Switch Exam Topic Coverage
  13. How This Book Is Organized
  14. Chapter 1. Fundamentals Review
    1. Switching Introduction
      1. Hubs and Switches
      2. Bridges and Switches
      3. Switches of Today
      4. Broadcast Domains
      5. MAC Addresses
      6. The Basic Ethernet Frame Format
      7. Basic Switching Function
      8. VLANs
      9. The Spanning Tree Protocol
      10. Trunking
      11. Port Channels
      12. Multilayer Switching
    2. Summary
  15. Chapter 2. Network Design Fundamentals
    1. Campus Network Structure
      1. Hierarchical Network Design
      2. Layer 3 in the Access Layer
      3. The Cisco Enterprise Campus Architecture
      4. The Need for a Core Layer
    2. Types of Cisco Switches
      1. Comparing Layer 2 and Multilayer Switches
      2. Cisco Switching Methods
      3. Hardware Forward Details
    3. Study Tips
    4. Summary
    5. Review Questions
  16. Chapter 3. Campus Network Architecture
    1. Implementing VLANs and Trunks in Campus Environment
      1. VLAN Overview
      2. VLAN Segmentation
      3. Implementing a Trunk in a Campus Environment
      4. Configuring, Verifying, and Troubleshooting VLANs and Trunks
      5. Configuring VLANs and Trunks
      6. Best Practices for VLANs and Trunking
      7. Voice VLAN Overview
      8. Switch Configuration for Wireless Network Support
    2. VLAN Trunking Protocol
      1. VTP Overview
      2. VTP Modes
      3. VTP Versions
      4. VTP Pruning
      5. VTP Authentication
      6. VTP Advertisements
      7. VTP Messages Types
      8. Configuring and Verifying VTP
      9. Overwriting VTP Configuration (Very Common Issue with VTP)
      10. Best Practices for VTP Implementation
    3. Implementing EtherChannel in a Switched Network
      1. The Need for EtherChannel
      2. EtherChannel Mode Interactions
      3. Layer 2 EtherChannel Configuration Guidelines
      4. EtherChannel Load-Balancing Options
      5. Configuring EtherChannel in a Switched Network
    4. Study Tips
    5. Summary
    6. Review Questions
  17. Chapter 4. Spanning Tree in Depth
    1. Spanning Tree Protocol Overview
      1. STP Need
      2. STP Standards
      3. STP Operations
      4. Bridge Protocol Data Units
      5. Root Bridge Election
      6. Root Port Election
      7. Designated Port Election
      8. STP Port States
      9. Per-VLAN STP Plus (PVST+)
      10. STP Topology Changes
    2. Rapid Spanning Tree Protocol
      1. RSTP Port Roles
      2. Comparison of RSTP and STP Port States
      3. RSTP Topology Changes
      4. RSTP Link Types
      5. Configuring and Modifying STP Behavior
    3. Implementing STP Stability Mechanisms
      1. Use UplinkFast
      2. Use BackboneFast
      3. Use PortFast
      4. Securing PortFast Interface with BPDU Guard
      5. Disabling STP with BPDU Filter
      6. Use Root Guard
      7. Loop Guard Overview
      8. Use UDLD
      9. Use FlexLinks
      10. STP Stability Mechanisms Recommendations
    4. Configuring Multiple Spanning Tree Protocol
      1. Introducing MST
      2. MST Regions
      3. STP Instances with MST
      4. Extended System ID for MST
      5. Configuring and Verifying MST
      6. Configuring MST Path Cost
      7. Configuring MST Port Priority
      8. MST Protocol Migration
      9. MST Recommended Practices
    5. Troubleshooting STP
      1. Potential STP Problems
    6. Study Tips
    7. Summary
    8. Review Questions
  18. Chapter 5. Inter-VLAN Routing
    1. Describing Inter-VLAN Routing
      1. Introduction to Inter-VLAN Routing
      2. Inter-VLAN Routing Using an External Router
      3. Inter-VLAN Routing Using Switch Virtual Interfaces
      4. Routing with Routed Ports
      5. Configuring Inter-VLAN Routing Using SVI and Routed Ports
      6. Troubleshooting Inter-VLAN Problems
    2. Layer 2 Versus Layer 3 EtherChannel
      1. Layer 3 EtherChannel Configuration
      2. Verifying Routing Protocols
    3. Implementing DHCP
      1. DHCP Overview
      2. Configuring DHCP in Multilayer Switched Network
    4. Study Tips
    5. Summary
    6. Review Questions
  19. Chapter 6. First-Hop Redundancy
    1. Overview of FHRP and HSRP
      1. The Need for First-Hop Redundancy
      2. HSRP Overview
      3. HSRP State Transition
      4. Aligning HSRP with STP Topology
      5. Configuring and Tuning HSRP
      6. Load Sharing with HSRP
      7. The Need for Interface Tracking with HSRP
      8. HSRP Interface Tracking
      9. HSRP and Object Tracking
      10. Configuring HSRP Authentication
      11. Tuning HSRP Timers
      12. HSRP Versions
    2. Configuring Layer 3 Redundancy with VRRP
      1. About VRRP
      2. Configuring VRRP and Spotting the Differences from HSRP
      3. Tracking and VRRP
    3. Configuring Layer 3 Redundancy with GLBP
      1. Introducing GLBP
      2. Comparing GLPB to HSRP
      3. GLBP States
      4. Configuring and Verifying GLBP
      5. GLBP Load-Balancing Options
      6. GLBP Authentication
      7. GLBP and STP
      8. Tracking and GLBP
    4. Study Tips
    5. Summary
    6. References
    7. Review Questions
  20. Chapter 7. Network Management
    1. AAA
      1. Authentication Options
      2. RADIUS and TACACS+ Overview
      3. Configuring AAA
      4. Configuring RADIUS for Console and vty Access
      5. Configuring TACACS+ for Console and vty Access
      6. AAA Authorization
      7. AAA Accounting
      8. Limitations of TACACS+ and RADIUS
    2. Identity-Based Networking
      1. IEEE 802.1X Port-Based Authentication Overview
      2. IEEE 802.1X Configuration Checklist
    3. Network Time Protocols
      1. The Need for Accurate Time
      2. Configuring the System Clock Manually
      3. Network Time Protocol Overview
      4. NTP Modes
      5. Other NTP Configuration Options
      6. NTP Example
      7. NTP Design Principles
      8. Securing NTP
      9. NTP Source Address
      10. NTP Versions
      11. SNTP
      12. PTP/IEEE-1588
    4. SNMP
      1. SNMP Overview
      2. SNMP Versions
      3. SNMP Best Practices
      4. SNMPv3 Configuration Example
    5. Study Tips
    6. Summary
    7. Review Questions
  21. Chapter 8. Switching Features and Technologies for the Campus Network
    1. Discovery Protocols
      1. Introduction to LLDP
      2. Basic Configuration of LLDP
      3. Discovering Neighbors Using LLDP
    2. Unidirectional Link Detection
      1. UDLD Mechanisms and Specifics
      2. UDLD Configuration
      3. Leveraging UDLD and STP Loop Guard Together
    3. Power over Ethernet
      1. PoE Components
      2. PoE Standards
      3. Configuring and Verifying PoE
    4. SDM Templates
      1. SDM Template Types
      2. Choosing the Right SDM Template
      3. System Resource Configuration on Other Platforms
    5. Monitoring Features
      1. SPAN and RSPAN Overview
      2. SPAN Configuration
      3. RSPAN Configuration
    6. IP SLA
      1. Introduction to IP SLA
      2. IP SLA Source and Responder
      3. IP SLA Configuration
      4. IP SLA Operation with Responder
      5. IP SLA Time Stamps
      6. Configuring Authentication for IP SLA
      7. IP SLA Example for UDP Jitter
    7. Study Tips
    8. Summary
    9. Review Questions
  22. Chapter 9. High Availability
    1. The Need for Logical Switching Architectures
    2. What Is StackWise?
      1. StackWise Benefits
      2. Verifying StackWise
    3. What Is VSS?
      1. VSS Benefits
      2. Verifying VSS
    4. Redundant Switch Supervisors
      1. Supervisor Redundancy Modes
    5. Study Tips
    6. Summary
    7. References
    8. Review Questions
  23. Chapter 10. Campus Network Security
    1. Overview of Switch Security Issues
    2. Cisco Switch Security Configuration Best Practices
    3. Campus Network Vulnerabilities
      1. Rogue Access
      2. Switch Vulnerabilities
      3. MAC Flooding Attacks
    4. Introducing Port Security
      1. Port Security Configuration
      2. Port Error Conditions
      3. Port Access Lists
    5. Storm Control
      1. Introduction to Storm Control
      2. Configuring and Verifying Storm Control on an Interface
    6. Mitigating Spoofing Attacks
      1. DHCP Spoofing Attacks
      2. DHCP Snooping
      3. IP Source Guard
      4. IPSG Configuration
      5. ARP Spoofing
      6. Dynamic ARP Inspection
    7. Securing VLAN Trunks
      1. Switch Spoofing
      2. VLAN Hopping
      3. VLAN Access Lists
    8. Private VLANs
      1. Introduction to PVLANs
    9. Study Tips
    10. Summary
    11. Review Questions
  24. Appendix A. Answers to Chapter Review Questions
    1. Chapter 2
    2. Chapter 3
    3. Chapter 4
    4. Chapter 5
    5. Chapter 6
    6. Chapter 7
    7. Chapter 8
    8. Chapter 9
    9. Chapter 10
  25. Index
  26. Code Snippets

Product information

  • Title: Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide
  • Author(s): Richard Froom, Erum Frahim
  • Release date: April 2015
  • Publisher(s): Cisco Press
  • ISBN: 9780133965827