|
Chapter 0 Introduction to Course |
|
|
1 | (6) |
|
|
1 | (6) |
|
0.0.1 Message to the Student |
|
|
1 | (1) |
|
|
1 | (1) |
|
0.0.1.2 A Global Community |
|
|
1 | (1) |
|
0.0.1.3 More Than Just Information |
|
|
1 | (1) |
|
|
2 | (1) |
|
0.0.1.5 Practice Leads to Mastery |
|
|
2 | (1) |
|
|
2 | (1) |
|
0.0.1.7 Engineering Journals |
|
|
2 | (1) |
|
0.0.1.8 Explore the World of Networking |
|
|
2 | (1) |
|
0.0.1.9 Create Your Own Worlds |
|
|
3 | (1) |
|
0.0.1.10 How Packet Tracer Helps Master Concepts |
|
|
3 | (1) |
|
|
3 | (1) |
|
0.1.1.1 Course GUI Tutorial |
|
|
4 | (1) |
|
|
5 | (2) |
|
Chapter 1 Introduction to Switched Networks |
|
|
7 | (18) |
|
|
7 | (1) |
|
|
7 | (1) |
|
1.0.1.2 Class Activity - Sent or Received |
|
|
7 | (1) |
|
|
8 | (8) |
|
|
8 | (1) |
|
1.1.1.1 Growing Complexity of Networks |
|
|
8 | (1) |
|
1.1.1.2 Elements of a Converged Network |
|
|
8 | (1) |
|
1.1.1.3 Cisco Borderless Network |
|
|
9 | (1) |
|
1.1.1.4 Hierarchy in the Borderless Switched Network |
|
|
9 | (1) |
|
1.1.1.5 Access, Distribution, and Core Layers |
|
|
10 | (1) |
|
1.1.1.6 Activity - Identify Switched Network Terminology |
|
|
11 | (1) |
|
|
11 | (1) |
|
1.1.2.1 Role of Switched Networks |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
1.1.2.4 Multilayer Switching |
|
|
13 | (1) |
|
1.1.2.5 Packet Tracer - Comparing 2960 and 3560 Switches |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
1.1.3.3 Power over Ethernet |
|
|
14 | (1) |
|
1.1.3.4 Cisco Catalyst Switch Breakdown |
|
|
15 | (1) |
|
1.1.3.5 Activity - Identify Switch Hardware |
|
|
16 | (1) |
|
1.1.3.6 Lab - Selecting Switching Hardware |
|
|
16 | (1) |
|
1.2 The Switched Environment |
|
|
16 | (5) |
|
|
16 | (1) |
|
1.2.1.1 Switching as a General Concept in Networking and Telecommunications |
|
|
16 | (1) |
|
1.2.1.2 Dynamically Populating a Switch MAC Address Table |
|
|
17 | (1) |
|
1.2.1.3 Switch Forwarding Methods |
|
|
18 | (1) |
|
1.2.1.4 Store-and-Forward Switching |
|
|
18 | (1) |
|
1.2.1.5 Cut-Through Switching |
|
|
19 | (1) |
|
1.2.1.6 Activity - Frame Forwarding Methods |
|
|
19 | (1) |
|
1.2.1.7 Activity - Switch It! |
|
|
19 | (1) |
|
|
20 | (1) |
|
1.2.2.1 Collision Domains |
|
|
20 | (1) |
|
1.2.2.2 Broadcast Domains |
|
|
20 | (1) |
|
1.2.2.3 Alleviating Network Congestion |
|
|
20 | (1) |
|
1.2.2.4 Activity - Circle the Domain |
|
|
21 | (1) |
|
|
21 | (4) |
|
1.3.1.1 Class Activity - It's Network Access Time |
|
|
21 | (1) |
|
1.3.1.2 Basic Switch Configurations |
|
|
22 | (1) |
|
1.3.1.3 Packet Tracer - Skills Integration Challenge |
|
|
22 | (1) |
|
|
22 | (2) |
|
|
24 | (1) |
|
Chapter 2 Basic Switching Concepts and Configuration |
|
|
25 | (26) |
|
2.0 Basic Switching Concepts and Configuration |
|
|
25 | (1) |
|
|
25 | (1) |
|
2.0.1.2 Class Activity - Stand By Me |
|
|
25 | (1) |
|
2.1 Basic Switch Configuration |
|
|
26 | (8) |
|
2.1.1 Configure a Switch with Initial Settings |
|
|
26 | (1) |
|
2.1.1.1 Switch Boot Sequence |
|
|
26 | (1) |
|
2.1.1.2 Recovering From a System Crash |
|
|
26 | (1) |
|
2.1.1.3 Switch LED Indicators |
|
|
27 | (1) |
|
2.1.1.4 Preparing for Basic Switch Management |
|
|
28 | (1) |
|
2.1.1.5 Configuring Basic Switch Management Access with IPv4 |
|
|
28 | (1) |
|
2.1.1.6 Lab - Configuring Basic Switch Settings |
|
|
29 | (1) |
|
2.1.2 Configure Switch Ports |
|
|
29 | (1) |
|
2.1.2.1 Duplex Communication |
|
|
29 | (1) |
|
2.1.2.2 Configure Switch Ports at the Physical Layer |
|
|
30 | (1) |
|
|
31 | (1) |
|
2.1.2.4 Verifying Switch Port Configuration |
|
|
31 | (1) |
|
2.1.2.5 Network Access Layer Issues |
|
|
32 | (1) |
|
2.1.2.6 Troubleshooting Network Access Layer Issues |
|
|
33 | (1) |
|
2.2 Switch Security: Management and Implementation |
|
|
34 | (12) |
|
2.2.1 Secure Remote Access |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
2.2.1.4 Packet Tracer - Configuring SSH |
|
|
36 | (1) |
|
2.2.2 Security Concerns in LANs |
|
|
36 | (1) |
|
2.2.2.1 Common Security Attacks: MAC Address Flooding |
|
|
36 | (1) |
|
2.2.2.2 Common Security Attacks: DHCP Spoofing |
|
|
37 | (1) |
|
2.2.2.3 Common Security Attacks: Leveraging CDP |
|
|
38 | (1) |
|
2.2.2.4 Activity - Identify Common Security Attacks |
|
|
39 | (1) |
|
2.2.3 Security Best Practices |
|
|
39 | (1) |
|
|
39 | (1) |
|
2.2.3.2 Network Security Tools and Testing |
|
|
39 | (1) |
|
2.2.3.3 Network Security Audits |
|
|
40 | (1) |
|
2.2.4 Switch Port Security |
|
|
40 | (1) |
|
2.2.4.1 Secure Unused Ports |
|
|
40 | (1) |
|
|
41 | (1) |
|
2.2.4.3 Port Security: Operation |
|
|
41 | (2) |
|
2.2.4.4 Port Security: Violation Modes |
|
|
43 | (1) |
|
2.2.4.5 Port Security: Configuring |
|
|
43 | (1) |
|
2.2.4.6 Port Security: Verifying |
|
|
43 | (1) |
|
2.2.4.7 Ports in Error Disabled State |
|
|
44 | (1) |
|
2.2.4.8 Network Time Protocol (NTP) |
|
|
44 | (1) |
|
2.2.4.9 Packet Tracer - Configuring Switch Port Security |
|
|
45 | (1) |
|
2.2.4.10 Packet Tracer - Troubleshooting Switch Port Security |
|
|
45 | (1) |
|
2.2.4.11 Lab - Configuring Switch Security Features |
|
|
46 | (1) |
|
|
46 | (5) |
|
2.3.1.1 Class Activity - Switch Trio |
|
|
46 | (1) |
|
2.3.1.2 Packet Tracer - Skills Integration Challenge |
|
|
46 | (1) |
|
|
47 | (2) |
|
|
49 | (2) |
|
|
51 | (24) |
|
|
51 | (1) |
|
|
51 | (1) |
|
3.0.1.2 Class Activity - Vacation Station |
|
|
51 | (1) |
|
|
52 | (6) |
|
|
52 | (1) |
|
|
52 | (1) |
|
3.1.1.2 Benefits of VLANs |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
3.1.1.5 Packet Tracer - Who Hears the Broadcast? |
|
|
54 | (1) |
|
3.1.2 VLANs in a Multi-Switched Environment |
|
|
55 | (1) |
|
|
55 | (1) |
|
3.1.2.2 Controlling Broadcast Domains with VLANs |
|
|
55 | (1) |
|
3.1.2.3 Tagging Ethernet Frames for VLAN Identification |
|
|
56 | (1) |
|
3.1.2.4 Native VLANs and 802.1Q Tagging |
|
|
56 | (1) |
|
3.1.2.5 Voice VLAN Tagging |
|
|
57 | (1) |
|
3.1.2.6 Activity - Predict Switch Behavior |
|
|
58 | (1) |
|
3.1.2.7 Packet Tracer - Investigating a VLAN Implementation |
|
|
58 | (1) |
|
|
58 | (10) |
|
|
58 | (1) |
|
3.2.1.1 VLAN Ranges on Catalyst Switches |
|
|
58 | (1) |
|
|
59 | (1) |
|
3.2.1.3 Assigning Ports to VLANs |
|
|
59 | (1) |
|
3.2.1.4 Changing VLAN Port Membership |
|
|
60 | (1) |
|
|
60 | (1) |
|
3.2.1.6 Verifying VLAN Information |
|
|
61 | (1) |
|
3.2.1.7 Packet Tracer - Configuring VLANs |
|
|
61 | (1) |
|
|
61 | (1) |
|
3.2.2.1 Configuring IEEE 802.1Q Trunk Links |
|
|
61 | (1) |
|
3.2.2.2 Resetting the Trunk to Default State |
|
|
62 | (1) |
|
3.2.2.3 Verifying Trunk Configuration |
|
|
62 | (1) |
|
3.2.2.4 Packet Tracer - Configuring Trunks |
|
|
62 | (1) |
|
3.2.2.5 Lab - Configuring VLANs and Trunking |
|
|
62 | (1) |
|
3.2.3 Dynamic Trunking Protocol |
|
|
63 | (1) |
|
3.2.3.1 Introduction to DTP |
|
|
63 | (1) |
|
3.2.3.2 Negotiated Interface Modes |
|
|
63 | (1) |
|
3.2.3.3 Activity - Predict DTP Behavior |
|
|
64 | (1) |
|
3.2.4 Troubleshoot VLANs and Trunks |
|
|
64 | (1) |
|
3.2.4.1 IP Addressing Issues with VLAN |
|
|
64 | (1) |
|
|
65 | (1) |
|
3.2.4.3 Introduction to Troubleshooting Trunks |
|
|
65 | (1) |
|
3.2.4.4 Common Problems with Trunks |
|
|
66 | (1) |
|
3.2.4.5 Trunk Mode Mismatches |
|
|
66 | (1) |
|
3.2.4.6 Incorrect VLAN List |
|
|
67 | (1) |
|
3.2.4.7 Packet Tracer - Troubleshooting a VLAN Implementation - Scenario 1 |
|
|
67 | (1) |
|
3.2.4.8 Packet Tracer - Troubleshooting a VLAN Implementation - Scenario 2 |
|
|
67 | (1) |
|
3.2.4.9 Lab - Troubleshooting VLAN Configurations |
|
|
67 | (1) |
|
3.3 VLAN Security and Design |
|
|
68 | (2) |
|
|
68 | (1) |
|
3.3.1.1 Switch Spoofing Attack |
|
|
68 | (1) |
|
3.3.1.2 Double-Tagging Attack |
|
|
68 | (1) |
|
|
69 | (1) |
|
3.3.1.4 Activity - Identify the Type of VLAN Attacks |
|
|
69 | (1) |
|
3.3.2 VLAN Best Practices |
|
|
69 | (1) |
|
3.3.2.1 VLAN Design Guidelines |
|
|
69 | (1) |
|
3.3.2.2 Lab - Implementing VLAN Security |
|
|
70 | (1) |
|
|
70 | (5) |
|
3.4.1.1 Class Activity - VLAN Plan |
|
|
70 | (1) |
|
3.4.1.2 Packet Tracer - Skills Integration Challenge |
|
|
71 | (1) |
|
|
71 | (2) |
|
|
73 | (2) |
|
|
75 | (32) |
|
|
75 | (1) |
|
|
75 | (1) |
|
4.0.1.2 Class Activity - Stormy Traffic |
|
|
75 | (1) |
|
4.1 Spanning Tree Concepts |
|
|
76 | (10) |
|
4.1.1 Purpose of Spanning Tree |
|
|
76 | (1) |
|
4.1.1.1 Redundancy at OSI Layers 1 and 2 |
|
|
76 | (1) |
|
4.1.1.2 Issues with Layer 1 Redundancy: MAC Database Instability |
|
|
77 | (1) |
|
4.1.1.3 Issues with Layer 1 Redundancy: Broadcast Storms |
|
|
78 | (1) |
|
4.1.1.4 Issues with Layer 1 Redundancy: Duplicate Unicast Frames |
|
|
78 | (1) |
|
4.1.1.5 Packet Tracer - Examining a Redundant Design |
|
|
79 | (1) |
|
|
79 | (1) |
|
4.1.2.1 Spanning Tree Algorithm: Introduction |
|
|
79 | (2) |
|
4.1.2.2 Spanning Tree Algorithm: Port Roles |
|
|
81 | (1) |
|
4.1.2.3 Spanning Tree Algorithm: Root Bridge |
|
|
82 | (1) |
|
4.1.2.4 Spanning Tree Algorithm: Path Cost |
|
|
82 | (1) |
|
4.1.2.5 802.1D BPDU Frame Format |
|
|
83 | (1) |
|
4.1.2.6 BPDU Propagation and Process |
|
|
84 | (1) |
|
4.1.2.7 Extended System ID |
|
|
85 | (1) |
|
4.1.2.8 Activity - Identify 802.1D Port Roles |
|
|
86 | (1) |
|
4.1.2.9 Video Demonstration - Observing Spanning Tree Protocol Operation |
|
|
86 | (1) |
|
4.1.2.10 Lab - Building a Switched Network with Redundant Links |
|
|
86 | (1) |
|
4.2 Varieties of Spanning Tree Protocols |
|
|
86 | (7) |
|
|
86 | (1) |
|
4.2.1.1 List of Spanning Tree Protocols |
|
|
86 | (1) |
|
4.2.1.2 Characteristics of the Spanning Tree Protocols |
|
|
87 | (1) |
|
4.2.1.3 Activity - Identify Types of Spanning Tree Protocols |
|
|
88 | (1) |
|
|
88 | (1) |
|
4.2.2.1 Overview of PVST+ |
|
|
88 | (1) |
|
4.2.2.2 Port States and PVST+ Operation |
|
|
89 | (1) |
|
4.2.2.3 Extended System ID and PVST+ Operation |
|
|
90 | (1) |
|
4.2.2.4 Activity - Identifying PVST+ Operation |
|
|
90 | (1) |
|
|
91 | (1) |
|
4.2.3.1 Overview of Rapid PVST+ |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
4.2.3.5 Activity - Identify Port Roles in Rapid PVST+ |
|
|
93 | (1) |
|
4.2.3.6 Activity - Compare PVST+ and Rapid PVST+ |
|
|
93 | (1) |
|
4.3 Spanning Tree Configuration |
|
|
93 | (7) |
|
4.3.1 PVST+ Configuration |
|
|
93 | (1) |
|
4.3.1.1 Catalyst 2960 Default Configuration |
|
|
93 | (1) |
|
4.3.1.2 Configuring and Verifying the Bridge ID |
|
|
93 | (1) |
|
4.3.1.3 PortFast and BPDU Guard |
|
|
94 | (1) |
|
4.3.1.4 PVST+Load Balancing |
|
|
95 | (1) |
|
4.3.1.5 Packet Tracer - Configuring PVST+ |
|
|
96 | (1) |
|
4.3.2 Rapid PVST+ Configuration |
|
|
96 | (1) |
|
4.3.2.1 Spanning Tree Mode |
|
|
96 | (1) |
|
4.3.2.2 Packet Tracer - Configuring Rapid PVST+ |
|
|
97 | (1) |
|
4.3.2.3 Lab - Configuring Rapid PVST+, PortFast and BPDU Guard |
|
|
97 | (1) |
|
4.3.3 STP Configuration Issues |
|
|
97 | (1) |
|
4.3.3.1 Analyzing the STP Topology |
|
|
97 | (1) |
|
4.3.3.2 Expected Topology versus Actual Topology |
|
|
98 | (1) |
|
4.3.3.3 Overview of Spanning Tree Status |
|
|
98 | (1) |
|
4.3.3.4 Spanning Tree Failure Consequences |
|
|
98 | (1) |
|
4.3.3.5 Repairing a Spanning Tree Problem |
|
|
99 | (1) |
|
4.3.3.6 Activity - Troubleshoot STP Configuration Issues |
|
|
99 | (1) |
|
4.4 First Hop Redundancy Protocols |
|
|
100 | (4) |
|
4.4.1 Concept of First Hop Redundancy Protocols |
|
|
100 | (1) |
|
4.4.1.1 Default Gateway Limitations |
|
|
100 | (1) |
|
4.4.1.2 Router Redundancy |
|
|
100 | (1) |
|
4.4.1.3 Steps for Router Failover |
|
|
101 | (1) |
|
4.4.1.4 Activity - Identify FHRP Terminology |
|
|
101 | (1) |
|
4.4.2 Varieties of First Hop Redundancy Protocols |
|
|
101 | (1) |
|
4.4.2.1 First Hop Redundancy Protocols |
|
|
101 | (1) |
|
4.4.2.2 Activity - Identify the Type of FHRP |
|
|
102 | (1) |
|
|
102 | (1) |
|
4.4.3.1 HSRP Verification |
|
|
102 | (1) |
|
4.4.3.2 GLBP Verification |
|
|
103 | (1) |
|
4.4.3.3 Syntax Checker - HSRP and GLBP |
|
|
103 | (1) |
|
4.4.3.4 Lab - Configuring HSRP and GLBP |
|
|
103 | (1) |
|
|
104 | (3) |
|
4.5.1.1 Class Activity - Documentation Tree |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (2) |
|
Chapter 5 Link Aggregation |
|
|
107 | (10) |
|
|
107 | (1) |
|
|
107 | (1) |
|
5.0.1.2 Class Activity - Imagine This |
|
|
107 | (1) |
|
5.1 Link Aggregation Concepts |
|
|
108 | (3) |
|
|
108 | (1) |
|
5.1.1.1 Introduction to Link Aggregation |
|
|
108 | (1) |
|
5.1.1.2 Advantages of EtherChannel |
|
|
108 | (1) |
|
5.1.2 EtherChannel Operation |
|
|
109 | (1) |
|
5.1.2.1 Implementation Restrictions |
|
|
109 | (1) |
|
5.1.2.2 Port Aggregation Protocol |
|
|
110 | (1) |
|
5.1.2.3 Link Aggregation Control Protocol |
|
|
111 | (1) |
|
5.1.2.4 Activity - Identify the PAgP and LACP Modes |
|
|
111 | (1) |
|
5.2 Link Aggregation Configuration |
|
|
111 | (4) |
|
5.2.1 Configuring EtherChannel |
|
|
111 | (1) |
|
5.2.1.1 Configuration Guidelines |
|
|
111 | (1) |
|
5.2.1.2 Configuring Interfaces |
|
|
112 | (1) |
|
5.2.1.3 Packet Tracer - Configuring EtherChannel |
|
|
112 | (1) |
|
5.2.1.4 Lab - Configuring EtherChannel |
|
|
113 | (1) |
|
5.2.2 Verifying and Troubleshooting EtherChannel |
|
|
113 | (1) |
|
5.2.2.1 Verifying EtherChannel |
|
|
113 | (1) |
|
5.2.2.2 Troubleshooting EtherChannel |
|
|
113 | (1) |
|
5.2.2.3 Packet Tracer - Troubleshooting EtherChannel |
|
|
114 | (1) |
|
5.2.2.4 Lab - Troubleshooting EtherChannel |
|
|
114 | (1) |
|
|
115 | (2) |
|
5.3.1.1 Class Activity - Linking Up |
|
|
115 | (1) |
|
5.3.1.2 Packet Tracer - Skills Integration Challenge |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
Chapter 6 Inter-VLAN Routing |
|
|
117 | (22) |
|
|
117 | (1) |
|
|
117 | (1) |
|
6.0.1.2 Class Activity - Switching to Local-Network Channels |
|
|
117 | (1) |
|
6.1 Inter-VLAN Routing Configuration |
|
|
118 | (9) |
|
6.1.1 Inter-VLAN Routing Operation |
|
|
118 | (1) |
|
6.1.1.1 What is Inter-VLAN Routing? |
|
|
118 | (1) |
|
6.1.1.2 Legacy Inter-VLAN Routing |
|
|
118 | (1) |
|
6.1.1.3 Router-on-a-Stick Inter-VLAN Routing |
|
|
119 | (1) |
|
6.1.1.4 Multilayer Switch Inter-VLAN Routing |
|
|
120 | (1) |
|
6.1.1.5 Activity - Identify the Types of Inter-VLAN Routing |
|
|
121 | (1) |
|
6.1.2 Configure Legacy Inter-VLAN Routing |
|
|
121 | (1) |
|
6.1.2.1 Configure Legacy Inter-VLAN Routing: Preparation |
|
|
121 | (1) |
|
6.1.2.2 Configure Legacy Inter-VLAN Routing: Switch Configuration |
|
|
122 | (1) |
|
6.1.2.3 Configure Legacy Inter-VLAN Routing: Router Interface Configuration |
|
|
122 | (1) |
|
6.1.2.4 Lab - Configuring Per-Interface Inter-VLAN Routing |
|
|
123 | (1) |
|
6.1.3 Configure Router-on-a-Stick Inter-VLAN Routing |
|
|
123 | (1) |
|
6.1.3.1 Configure Router-on-a-Stick: Preparation |
|
|
123 | (1) |
|
6.1.3.2 Configure Router-on-a-Stick: Switch Configuration |
|
|
124 | (1) |
|
6.1.3.3 Configure Router-on-a-Stick: Router Subinterface Configuration |
|
|
124 | (1) |
|
6.1.3.4 Configure Router-on-a-Stick: Verifying Subinterfaces |
|
|
125 | (1) |
|
6.1.3.5 Configure Router-on-a-Stick: Verifying Routing |
|
|
125 | (1) |
|
6.1.3.6 Packet Tracer - Configuring Router-on-a-Stick Inter-VLAN Routing |
|
|
126 | (1) |
|
6.1.3.7 Lab - Configuring 801.2Q Trunk-Based Inter-VLAN Routing |
|
|
126 | (1) |
|
6.2 Troubleshoot Inter-VLAN Routing |
|
|
127 | (3) |
|
6.2.1 Inter-VLAN Configuration Issues |
|
|
127 | (1) |
|
6.2.1.1 Switch Port Issues |
|
|
127 | (1) |
|
6.2.1.2 Verify Switch Configuration |
|
|
127 | (1) |
|
|
128 | (1) |
|
6.2.1.4 Verify Router Configuration |
|
|
128 | (1) |
|
6.2.2 IP Addressing Issues |
|
|
129 | (1) |
|
6.2.2.1 Errors with IP Addresses and Subnet Masks |
|
|
129 | (1) |
|
6.2.2.2 Verifying IP Address and Subnet Mask Configuration Issues |
|
|
129 | (1) |
|
6.2.2.3 Activity - Identify the Troubleshooting Command for an Inter-VLAN Routing Issue |
|
|
130 | (1) |
|
6.2.2.4 Packet Tracer-Troubleshooting Inter-VLAN Routing |
|
|
130 | (1) |
|
|
130 | (5) |
|
6.3.1 Layer 3 Switching Operation and Configuration |
|
|
130 | (1) |
|
6.3.1.1 Introduction to Layer 3 Switching |
|
|
130 | (1) |
|
6.3.1.2 Inter-VLAN Routing with Switch Virtual Interfaces |
|
|
130 | (1) |
|
6.3.1.3 Inter-VLAN Routing with Switch Virtual Interfaces (Cont.) |
|
|
131 | (1) |
|
6.3.1.4 Inter-VLAN Routing with Routed Ports |
|
|
132 | (1) |
|
6.3.1.5 Configuring Static Routes on a Catalyst 2960 |
|
|
132 | (1) |
|
6.3.2 Troubleshoot Layer 3 Switching |
|
|
133 | (1) |
|
6.3.2.1 Layer 3 Switch Configuration Issues |
|
|
133 | (1) |
|
6.3.2.2 Example: Troubleshooting Layer 3 Switching |
|
|
134 | (1) |
|
6.3.2.3 Activity - Troubleshoot Layer 3 Switching Issues |
|
|
135 | (1) |
|
6.3.2.4 Lab - Troubleshooting Inter-VLAN Routing |
|
|
135 | (1) |
|
|
135 | (4) |
|
6.4.1.1 Class Activity - The Inside Track |
|
|
135 | (1) |
|
6.4.1.2 Packet Tracer - Skills Integration Challenge |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (2) |
|
|
139 | (24) |
|
|
139 | (1) |
|
|
139 | (1) |
|
7.0.1.2 Class Activity - Own or Lease? |
|
|
139 | (1) |
|
7.1 Dynamic Host Configuration Protocol v4 |
|
|
140 | (10) |
|
|
140 | (1) |
|
7.1.1.1 Introducing DHCPv4 |
|
|
140 | (1) |
|
|
141 | (1) |
|
7.1.1.3 DHCPv4 Message Format |
|
|
142 | (1) |
|
7.1.1.4 DHCPv4 Discover and Offer Messages |
|
|
143 | (1) |
|
7.1.1.5 Activity - Identify the Steps in DHCPv4 Operation |
|
|
144 | (1) |
|
7.1.2 Configuring a Basic DHCPv4 Server |
|
|
144 | (1) |
|
7.1.2.1 Configuring a Basic DHCPv4 Server |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
7.1.2.4 Lab - Configuring Basic DHCPv4 on a Router |
|
|
146 | (1) |
|
7.1.2.5 Lab - Configuring Basic DHCPv4 on a Switch |
|
|
147 | (1) |
|
7.1.3 Configure DHCPv4 Client |
|
|
147 | (1) |
|
7.1.3.1 Configuring a Router as DHCPv4 Client |
|
|
147 | (1) |
|
7.1.3.2 Configuring a SOHO Router as a DHCPv4 Client |
|
|
147 | (1) |
|
7.1.3.3 Packet Tracer - Configuring DHCPv4 Using Cisco IOS |
|
|
148 | (1) |
|
7.1.4 Troubleshoot DHCPv4 |
|
|
148 | (1) |
|
7.1.4.1 Troubleshooting Tasks |
|
|
148 | (1) |
|
7.1.4.2 Verify Router DHCPv4 Configuration |
|
|
149 | (1) |
|
|
149 | (1) |
|
7.1.4.4 Lab - Troubleshooting DHCPv4 |
|
|
150 | (1) |
|
7.2 Dynamic Host Configuration Protocol v6 |
|
|
150 | (10) |
|
|
150 | (1) |
|
7.2.1.1 Stateless Address Autoconfiguration (SLAAC) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
7.2.1.5 Stateless DHCPv6 Option |
|
|
152 | (1) |
|
7.2.1.6 Stateful DHCPv6 Option |
|
|
153 | (1) |
|
7.2.1.7 DHCPv6 Operations |
|
|
153 | (1) |
|
7.2.1.8 Activity - Identify the Steps in DHCPv6 Operation |
|
|
154 | (1) |
|
|
154 | (1) |
|
7.2.2.1 Configuring a Router as a Stateless DHCPv6 Server |
|
|
154 | (1) |
|
7.2.2.2 Configuring a Router as a Stateless DHCPv6 Client |
|
|
155 | (1) |
|
7.2.2.3 Verifying Stateless DHCPv6 |
|
|
155 | (1) |
|
7.2.3 Stateful DHCPv6 Server |
|
|
156 | (1) |
|
7.2.3.1 Configuring a Router as a Stateful DHCPv6 Server |
|
|
156 | (1) |
|
7.2.3.2 Configuring a Router as a Stateful DHCPv6 Client |
|
|
157 | (1) |
|
7.2.3.3 Verifying Stateful DHCPv6 |
|
|
157 | (1) |
|
7.2.3.4 Configuring a Router as a DHCPv6 Relay Agent |
|
|
157 | (1) |
|
7.2.3.5 Lab - Configuring Stateless and Stateful DHCPv6 |
|
|
158 | (1) |
|
7.2.4 Troubleshoot DHCPv6 |
|
|
158 | (1) |
|
7.2.4.1 Troubleshooting Tasks |
|
|
158 | (1) |
|
7.2.4.2 Verify Router DHCPv6 Configuration |
|
|
159 | (1) |
|
|
159 | (1) |
|
7.2.4.4 Lab - Troubleshooting DHCPv6 |
|
|
160 | (1) |
|
|
160 | (3) |
|
7.3.1.1 Class Activity - IoE and DHCP |
|
|
160 | (1) |
|
7.3.1.2 Packet Tracer Skills Integration Challenge |
|
|
160 | (1) |
|
|
160 | (2) |
|
|
162 | (1) |
|
|
163 | |
|
|
163 | (1) |
|
|
163 | (1) |
|
8.0.1.2 Class Activity - Make Mine Wireless |
|
|
163 | (1) |
|
|
163 | (13) |
|
8.1.1 Introduction to Wireless |
|
|
163 | (1) |
|
8.1.1.1 Supporting Mobility |
|
|
163 | (1) |
|
8.1.1.2 Benefits of Wireless |
|
|
164 | (1) |
|
8.1.1.3 Wireless Technologies |
|
|
165 | (1) |
|
8.1.1.4 Radio Frequencies |
|
|
165 | (1) |
|
|
166 | (1) |
|
8.1.1.6 Wi-Fi Certification |
|
|
167 | (1) |
|
8.1.1.7 Comparing WLANs to a LAN |
|
|
168 | (1) |
|
8.1.1.8 Activity - Identify the Wireless Technology |
|
|
169 | (1) |
|
8.1.1.9 Activity - Compare Wireless Standards |
|
|
169 | (1) |
|
8.1.1.10 Activity - Compare WLANs and LANs |
|
|
169 | (1) |
|
8.1.2 Components of WLANs |
|
|
169 | (1) |
|
|
169 | (1) |
|
8.1.2.2 Wireless Home Router |
|
|
169 | (1) |
|
8.1.2.3 Business Wireless Solutions |
|
|
170 | (1) |
|
8.1.2.4 Wireless Access Points |
|
|
170 | (1) |
|
8.1.2.5 Small Wireless Deployment Solutions |
|
|
171 | (1) |
|
8.1.2.6 Large Wireless Deployment Solutions |
|
|
172 | (1) |
|
8.1.2.7 Large Wireless Deployment Solutions, Cont. |
|
|
173 | (1) |
|
8.1.2.8 Wireless Antennas |
|
|
173 | (1) |
|
8.1.2.9 Activity - Identify WLAN Component Terminology |
|
|
174 | (1) |
|
8.1.2.10 Lab - Investigating Wireless Implementations |
|
|
174 | (1) |
|
8.1.3 802.11 WLAN Topologies |
|
|
174 | (1) |
|
8.1.3.1 802.11 Wireless Topology Modes |
|
|
174 | (1) |
|
|
175 | (1) |
|
8.1.3.3 Infrastructure Mode |
|
|
175 | (1) |
|
8.1.3.4 Activity - Identify WLAN Topology Terminology |
|
|
176 | (1) |
|
8.2 Wireless LAN Operations |
|
|
176 | (9) |
|
8.2.1 802.11 Frame Structure |
|
|
176 | (1) |
|
8.2.1.1 Wireless 802.11 Frame |
|
|
176 | (1) |
|
8.2.1.2 Frame Control Field |
|
|
177 | (1) |
|
8.2.1.3 Wireless Frame Type |
|
|
178 | (1) |
|
8.2.1.4 Management Frames |
|
|
178 | (1) |
|
|
179 | (1) |
|
8.2.1.6 Activity - Identify the 802.11 Frame Control Fields |
|
|
179 | (1) |
|
|
179 | (1) |
|
8.2.2.1 Carrier Sense Multiple Access with Collision Avoidance |
|
|
179 | (1) |
|
8.2.2.2 Wireless Clients and Access Point Association |
|
|
180 | (1) |
|
8.2.2.3 Association Parameters |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
8.2.2.6 Activity - Order the Steps in the Client and AP Association Process |
|
|
183 | (1) |
|
|
183 | (1) |
|
8.2.3.1 Frequency Channel Saturation |
|
|
183 | (1) |
|
8.2.3.2 Selecting Channels |
|
|
184 | (1) |
|
8.2.3.3 Planning a WLAN Deployment |
|
|
184 | (1) |
|
8.2.3.4 Activity - Identify Channel Management Terminology |
|
|
185 | (1) |
|
8.2.3.5 Activity - Cisco Wireless Explorer Game |
|
|
185 | (1) |
|
8.3 Wireless LAN Security |
|
|
185 | (7) |
|
|
185 | (1) |
|
8.3.1.1 Securing Wireless |
|
|
185 | (1) |
|
|
186 | (1) |
|
8.3.1.3 Management Frame DoS Attacks |
|
|
187 | (1) |
|
8.3.1.4 Rogue Access Points |
|
|
187 | (1) |
|
8.3.1.5 Man-in-the-Middle Attack |
|
|
188 | (1) |
|
|
189 | (1) |
|
8.3.2.1 Wireless Security Overview |
|
|
189 | (1) |
|
8.3.2.2 Shared Key Authentication Methods |
|
|
189 | (1) |
|
8.3.2.3 Encryption Methods |
|
|
190 | (1) |
|
8.3.2.4 Authenticating a Home User |
|
|
191 | (1) |
|
8.3.2.5 Authentication in the Enterprise |
|
|
191 | (1) |
|
8.3.2.6 Activity - Identify the WLAN Authentication Characteristics |
|
|
192 | (1) |
|
8.4 Wireless LAN Configuration |
|
|
192 | (6) |
|
8.4.1 Configure a Wireless Router |
|
|
192 | (1) |
|
8.4.1.1 Configuring a Wireless Router |
|
|
192 | (1) |
|
8.4.1.2 Setting Up and Installed Initial Linksys EAS6500 |
|
|
193 | (1) |
|
8.4.1.3 Configuring the Linksys Smart Wi-Fi Homepage |
|
|
193 | (1) |
|
8.4.1.4 Smart Wi-Fi Settings |
|
|
194 | (1) |
|
8.4.1.5 Smart Wi-Fi Tools |
|
|
194 | (1) |
|
8.4.1.6 Backing Up a Configuration |
|
|
195 | (1) |
|
8.4.2 Configuring Wireless Clients |
|
|
195 | (1) |
|
8.4.2.1 Connecting Wireless Clients |
|
|
195 | (1) |
|
8.4.2.2 Packet Tracer - Configuring Wireless LAN Access |
|
|
195 | (1) |
|
8.4.2.3 Lab - Configuring a Wireless Router and Client |
|
|
196 | (1) |
|
8.4.3 Troubleshoot WLAN Issues |
|
|
196 | (1) |
|
8.4.3.1 Troubleshooting Approaches |
|
|
196 | (1) |
|
8.4.3.2 Wireless Client Not Connecting |
|
|
196 | (1) |
|
8.4.3.3 Troubleshooting When the Network Is Slow |
|
|
197 | (1) |
|
8.4.3.4 Updating Firmware |
|
|
198 | (1) |
|
8.4.3.5 Activity - Identify the Troubleshooting Solution |
|
|
198 | (1) |
|
|
198 | |
|
8.5.1.1 Class Activity - Inside and Outside Control |
|
|
198 | (1) |
|
8.5.1.2 Packet Tracer - Skills Integration Challenge |
|
|
199 | (1) |
|
|
199 | (2) |
|
|
201 | |