Course Description |
In SWITCH, you will learn to plan, configure, and verify the implementation of complex enterprise switching solutions for campus environments using the Cisco Enterprise Campus Architecture. This course is a component of the Cisco CCNP Routing and Switching curriculum, a professional-level certification, and it is designed to give you a firm understanding of how to manage switches in an enterprise campus environment. Hands-on labs reinforce what you learn. |
Course Objective |
Candidates will learn: |
| Analyze campus network designs | | Implement VLANs in a network campus | | Implement spanning tree | | Implement inter-VLAN routing in a campus network | | Implement a highly available network | | Implement high-availability technologies and techniques using multilayer switches in a campus environment | | Implement security features in a switched network | | Integrate WLANs into a campus network | | Accommodate voice and video in campus networks | |
Duration |
5 days |
Target Audience |
| Network engineers with at least one year of professional work experience who are ready to advance their skills and work independently on complex network solutions | | Network professionals, including network engineers, network operations center (NOC) technical support personnel, or help desk technicians, who will need to correctly implement switch-based solutions given a network design using Cisco IOS services and features | | Any individual involved in network operations and support | |
Pre-requisites |
| CCNA certification or familiarity with internetworking technologies and the ability to perform basic configuration of Cisco routers, including practical experience installing, operating, and maintaining Cisco routers and switches in an enterprise environment | | Knowledge of IP, including the ability to perform IP subnetting on non-octal boundaries, configure IP standard and extended access lists, operate and configure distance vector routing protocol, configure serial interface, and interpret a Cisco routing table | |
Course Outline |
1. Analyzing Campus Network Designs |
Cisco SONA |
| Benefits of the enterprise campus architecture | | Function of the core layer | | Impact of traffic types on the network infrastructure | | Cisco Lifecycle Services and Network Implementation | | The PPDIOO lifecycle approach | | PPDIOO implementation planning | |
2. Implementing VLANs in Campus Networks |
Applying Best Practices for VLAN Topologies |
| VLAN segmentation models | | Given an enterprise VLAN network design, information needed to create an implementation plan, choices that need to be made, and the consequences of those choices | | Given an enterprise VLAN network design that contains end-to-end VLANs and trunks, create an implementation and verification plan then successfully execute that plan | | Given an enterprise VLAN network design that contains VTP, create an implementation and verification plan then successfully execute that plan | |
Configuring Private VLANs (PVLANs) |
| Applying Best Practices for VLAN Topologies | | VLAN segmentation models | | Given an enterprise VLAN network design, information needed to create an implementation plan, choices that need to be made, and the consequences of those choices | | Given an enterprise VLAN network design that contains end-to-end VLANs and trunks, create an implementation and verification plan then successfully execute that plan | | Given an enterprise VLAN network design that contains VTP, create an implementation and verification plan then successfully execute that plan | |
Configuring Link Aggregation with EtherChannel |
| Applying Best Practices for VLAN Topologies | | VLAN segmentation models | | Given an enterprise VLAN network design, information needed to create an implementation plan, choices that need to be made, and the consequences of those choices | | Given an enterprise VLAN network design that contains end-to-end VLANs and trunks, create an implementation and verification plan then successfully execute that plan | | Given an enterprise VLAN network design that contains VTP, create an implementation and verification plan then successfully execute that plan | |
3. Implementing Spanning Tree |
Spanning Tree Protocol (STP) Enhancements | | Spanning Tree Protocol (STP) Enhancements | | STP standards | | STP operations | | Implement and configure PVRST+ | | RSTP port roles | | Verify RSTP configurations | | MSTP | | Implement and configure MSTP | | | | STP Stability Mechanisms | | Protect the operation of STP | | Configure BPDUGuard | | Configure BPDUFilter | | Configure RootGuard | | Configure LoopGuard | | Configure UDLD to detect and shut down unidirectional links | | Optimize STP operations by using the right combination of STP stability features | | | |
4. Implementing Inter-VLAN Routing |
Routing Between VLANs |
| Configure and verify inter-VLAN routing in a Layer 2 topology using an external router, a switch SVI, or a switch-routed interface | | Configure both a switch and router to accommodate inter-VLAN packet transfer using an external router | | Layer 3 SVI | | Commands that are used to configure an SVI | | A routed port on a multilayer switch | | Commands that are used to configure a routed port on a multilayer switch | | Configure Layer 3 EtherChannel links | | Configure inter-VLAN routing on a multilayer switch | | Configure DHCP services on a Layer 3 switch | |
Deploying Multilayer Switching with Cisco Express Forwarding |
| Configure and verify inter-VLAN routing in a Layer 2 topology using multilayer switching with Cisco Express Forwarding | | Process of multilayer switching and how it differs when you are performing Layer 2 vs. Layer 3 switching | | Packet and frame header rewriting performed by a multilayer switch | | Layer 3 switch processing | | Switching methods available on a Cisco switch | | Configure Cisco Express Forwarding on a Cisco switch | |
5. Implementing a Highly Available Network |
Configuring Layer 3 Redundancy with HSRP | | High Availability | | Evaluate the uses, requirements, benefits, and performance expectations of high availability in a given enterprise network design | | Resiliency for high availability | | Design the network for optimal redundancy | | | | Implementing High Availability | | Implement high availability at the switch level | | Use Cisco StackWise technology on access switches | | Evaluate the impact of too little redundancy | | Assess the impact of uplink failure | | | Implementing Network Monitoring | | Implement network monitoring | | Configure IP SLA technology | | | | | |
6. Implementing Layer 3 High Availability |
Configuring Layer 3 Redundancy with HSRP | | Routing issues | | Router redundancy process | | Configure HSRP operations | | Fine-tune HSRP | | Troubleshoot HSRP | | | | Configuring Layer 3 Redundancy with VRRP and GLBP | | VRRP | | VRRP operations process | | Configure VRRP | | GLBP | | GLBP operations process | | Configure GLBP | | | |
7. Minimizing Service Loss and Data Theft in a Campus Network |
Planning for Support of Voice in a Campus Network | | Components of a VoIP network and the components of IP telephony | | Uniform bandwidth consumption of voice traffic vs. the intermittent bandwidth consumption of data traffic | | Compare video bandwidth consumption to voice and data bandwidth consumption based on video application types | | Solution for latency, jitter, bandwidth, packet loss, reliability, and security for voice and video traffic integration into a data network | | | | Integrating and Verifying VoIP in a Campus Infrastructure | | Plan for VoIP requirements | | Voice VLANs | | Configure and Verify Voice VLANs | | Plan PoE requirements and configure PoE | | Provide additional services required by VoIP devices | | Create a Test Plan for VoIP integration | | | | | Working with Specialists to Accommodate Voice and Video on Campus Switches | | High availability applied to VoIP or video traffic | | Build an integrated voice/video/data campus network | | The need for QoS for VoIP and video integration | | | Protecting Against VLAN Attacks | | How VLAN hopping occurs and why it is a security vulnerability | | Procedure for configuring a switch to mitigate VLAN hopping attacks | | VACLs and their purpose as part of VLAN security | | Procedure for configuring VACLs | | | Protecting Against Spoofing Attacks | | DHCP spoofing attacks | | Prevent attacks using DHCP snooping | | Configure DHCP snooping | | ARP poisoning | | Protect against ARP spoofing attacks with DAI | | | | | Switch Security Issues | | Switch and Layer 2 security as a subset of an overall network security plan | | How a rogue device gains unauthorized access to a network | | Categorize switch attack types and list mitigation options | | How a MAC flooding attack works to overflow a CAM Campus Backbone Layer table | | How port security is used to block input from devices based on Layer 2 restrictions | | Procedure for configuring port security on a switch | | Methods that can be used for authentication using AAA | | Port-based authentication using 802.1X | | | Securing Network Services | | Cisco Discovery Protocol and LLDP vulnerabilities | | Telnet protocol vulnerabilities | | Configure SSH | | Configure vty ACLs | | Configure Cisco IOS secure HTTP server | | Switch security considerations | | | | |
8. Accommodating Voice and Video in Campus Networks |
| Configure basic QoS for voice and video VLANs | |
9. Integrating Wireless LANs into a Campus Network |
Comparing WLANs with Campus Networks | | WLANs | | Compare wired and wireless LAN | | Main wireless LAN topologies | | Settings specific to WLANs, such as SSIDs, and WLAN-to-VLAN mapping | | Provide additional services required by VoIP devices | | Create a Test Plan for VoIP integration | | | | Preparing the Campus Infrastructure for WLANs | | Best placement for APs and controllers | | Configure switches for WLAN devices | | Gather WLAN requirements | | Plan WLAN integration | | Create a test plan | | | Assessing the Impact of WLANs on Campus Networks | | WLAN implementations | | Compare WLAN solutions | | Assess traffic flow in an autonomous AP configuration and its impact on the campus LAN | | Assess traffic flow in an controller-based configuration and its impact on the campus LAN | | | | |