(CI-BCMSN) Building Cisco Multilayer Switched Networks

Kosmous Srl
Online

Chiedi il prezzo
Vuoi parlare del corso con un consulente?
Confronta questo corso con altri simili
Leggi tutto

Informazione importanti

  • Corso
  • Online
Descrizione

Il corso insegna come implementare le reti di tipo campus usando le tecnologie switching multilayer con Ethernet ad alta velocità e le tipologie wireless. Inoltre affronta i temi dell'integrazione delle tecnologie di routing e switching per creare una rete efficiente. Insegna a progettare, costruire e configurare una rete campus al fine di mantenere un elevato grado di affidabilità, performance e sicurezza indipendentemente da guasti di livello fisico o di apparati (router o switch) conservando intatti i requisiti delle applicazioni quali voce, video e wireless. Il corso insegna come implementare le reti di tipo campus usando le tecnologie switching multilayer con Ethernet ad alta velocità e le tipologie wireless. Inoltre affronta i temi dell'integrazione delle tecnologie di routing e switching per creare una rete efficiente. Insegna a progettare, costruire e configurare una rete campus al fine di mantenere un elevato grado di affidabilità, performance e sicurezza indipendentemente da guasti di livello fisico o di apparati (router o switch) conservando intatti i requisiti delle applicazioni quali voce, video e wireless.

Informazione importanti

Programma

  • Introduction to Campus Networks
    • Course Introduction
    • Campus Networks as part of an Enterprise Network
    • Devices in a Nonhierarchical Network
    • Layer 2 Network Issues
    • Routed Network Issues
    • What is a Multilayer Switch
    • Issues with Multilayer Switches and VLANs in a Nonhierarchical Network
    • The Enterprise Composite Model
      • Building Access
      • Building Distribution
      • Server Farm Module
      • Campus Core
      • Network Management
    • Benefits of the Enterprise Composite Model
    • Campus Infrastructure Module
  • Defining Virtual Networks (VLANs)
    • Best Practices for VLAN Topologies
      • Issues in a Poorly Designed Network
      • Grouping Business Functions into VLANs
      • Interconnection Technologies
      • Determining Equipment and Cabling Needs
      • Mapping VLANs in a Hierarchical Network
      • Considering Traffic Source to Destination
      • Reviewing Switch Configuration Interfaces
    • Implementing VLANs
      • Benefits of VLANs in an Enterprise Network
      • Local VLANs
      • End-to-End VLANs
      • VLAN Configuration Modes
      • VLAN Access Ports
      • VLAN Implementation Commands
      • Implementing a VLAN
    • Implementing Trunks
      • VLAN Trunks
      • ISL Trunking
      • 802.1Q Trunking
      • 802.1Q Native VLANs
      • Issues with 802.1Q Native VLANs
      • VLAN Ranges
      • Trunking Configuration Commands
      • Configuring Trunking
      • Setting Dynamic Trunking Protocol (DTP)
    • Propagating VLAN Configurations with VTP
      • VTP Domains
      • VTP Protocol
      • VTP Modes
      • VTP Pruning
      • VTP Operation
      • VTP Configuration Commands
      • Configuring a VTP Management Domain
      • Adding New Switches to an Existing VTP
    • Correcting Common VLAN Configuration Errors
      • Issues with 802.1Q Native VLANS
      • Resolving Trunk Link Problems
  • Implementing Spanning Tree
    • Spanning Tree Protocol
      • Transparent Bridges
      • Identifying Traffic Loops
      • Loop Free Network
      • 802.1D Spanning Tree Protocol
      • Root Bridge
      • Port Roles
      • Enhancements to STP
    • Preventing STP Forwarding Loops
      • Unidirectional Link Detection
      • Loop Guard
      • Preventing STP Failures Due to Unidirectional Links
      • Configuring UDLD and Loop Guard
    • Implementing Rapid Spanning Tree Protocol (RSTP)
      • RSTP
      • RSTP Port States
      • RSTP Port Roles
      • Edge Ports
      • RSTP Link Types
      • RSTP BPDU
      • RSTP Proposal and Agreement Process
      • RSTP Topology Change
      • RSTP Implementation Commands
      • Implementing RSTP Commands
    • Implementing the Multiple Spanning Tree Protocol (MSTP)
      • MSTP
      • MSTP Regions
      • Extended System ID
      • Interacting between MSTP regions and 802.1Q
      • MSPT Implementation Commands
      • Configuring and Verifying MSTP
    • Configuring Link Aggregation and EtherChannel
      • EtherChannel
      • PAgP and LACP Protocols
      • EtherChannel Configuration
      • Configuring Port Channels using EtherChannel
      • Configuring Load Balancing over EtherChannel
  • Implementing InterVLAN Routing
    • Routing Between VLANs
      • Multilayer Switching
      • Layer 2 Switch Forwarding Process
      • Inter-VLAN Routing using an External Router
      • Inter-VLAN Routing using External Router Configurtion Commands
      • Configuring Inter-VLAN Routing using an External Router
    • Deploying CEF-Based Multilayer Switching
      • Layer 3 Switching
      • CEF-Based Multilayer Switches
      • Multilayer Switch Packet Forwarding Process
      • CEF Configuration Commands
      • Enabling CEF-Based Multilayer Switching
      • Common CEF problems and Solutions
      • CEF Troubleshooting Commands
      • Troubleshooting CEF-Based Multilayer Switching
    • Enabling Routing Between VLANs
      • Layer 3 Switch Virtual Interfaces
      • Routed Interfaces on a Multilayer Switch
      • Configuration Commands for Inter-VLAN Communication on a Multilayer Switch
      • Configuring Inter-VLAN Routing on a Multilayer Switch
  • Implementing High Availability in a Campus Environment
    • Configuring Layer 3 Redundancy with HSRP
    • Router Redundancy Process
    • Routing Issues
    • HSRP
    • HSRP Operations
    • HSRP States
    • HSRP Configuration Commands
    • Enabling HSRP
    • HSRP Optimization Options
    • Tuning HSRP Operations
    • HSRP Debug Commands
    • Debugging HSRP Operations
    • Configuring Layer 3 Redundancy with VRRP and GLBP
    • Virtual Router Redundancy
    • VRRP Operations Process
    • Gateway Load Balancing Protocol
    • GLBP Operations Process
    • VRRP and GLBP Configuration
    • Enabling VRRP and GLBP
  • Wireless Client Access
    • Introducing Wireless LANs (WLANs)
      • WLANs
      • Similarities Between A LAN and a WLAN
      • Differences Between a LAN and WLAN
      • WLAN Components
      • WLAN Technology Implementations
      • Building Blocks of AP WLAN Topologies
      • Building Blocks of Bridging WLAN Topologies
      • Topology Implementations
    • Wireless Theory and Standards
      • Radio Frequency (RF) Basics
      • WLAN Math
      • Types of Antennas
      • Regulatory Agencies Governing WLANs
      • Operational Standards of IEEE 802.11
      • IEEE 802.11 Standards in the 2.4GHz Band
      • IEEE 802.11a
      • Comparing the 802.11 Standards
    • Implementing WLANs
      • 802.11b/g Channel Reuse
      • 802.11a Channel Reuse
      • WLAN as a Shared Medium - Best Practices
      • Bridging Path Considerations
      • Power Implementation
    • Cisco WLAN
      • Enterprise WLAN Issues
      • Overview of Cisco WLAN
      • Comparing Autonomous and Lightweight WLAN
      • Comparing Core and Advanced Feature Roaming
      • Split MAC Architecture
      • LWAPP AP Association
      • Mixing WLAPP with Autonomous APs
    • Cisco Wireless Clients
      • Wireless Client Association
      • Open Authentication
      • Pre-Shared Key Authentication (WEP)
      • Introducing WLAN Security
      • Cisco Client Cards
      • Cisco Compatible Extensions Program
    • Configuring Basic WLAN
      • Available Interfaces for WLAN Configuration
      • Connect to Controller
      • Configuring the Controller
      • Verify Controller Configuration
  • Configuring Campus Switches to Support Voice
    • Planning for Implementation of Voice in a Campus Network
      • Converged Network Benefits
      • VoIP Network Components
      • Traffic Characteristics of Voice and Data
      • VoIP Call Flow
      • Auxiliary VLANs
      • Quality of Service (QoS)
      • Importance of High Availability for VoIP
      • Power Requirements in Support of VoIP
    • Accommodating Voice Traffic on Campus Switches
      • QoS Trust Boundaries
      • LAN-Based Classification and Marking
      • Basic Switch Commands to Support Attachment of a Cisco IP Phone
      • Configuring a Switch for the Attachment of a Cisco IP Phone
      • What is AutoQoS VoIP?
      • Configuring AutoQoS VoIP on a Catalyst Switch
  • Minimizing Service Loss and Data Theft in a Campus Network
    • Switch Security Issues
    • Overview of Switch Security Concerns
    • Switch Attack Categories
    • MAC Flood Attack
    • Port Security
    • Port Security Configuration
    • Configuring Port Security on a Switch
    • Port Security with Sticky MAC Addresses
    • Unauthorized Access by Rogue Devices
    • 802.1x Port-Based Authentication
    • Protecting Against VLAN Attacks
    • VLAN Hopping
    • Mitigating VLAN Hopping
    • VLAN Access Control Lists (VACLs)
    • Configuring VACLs
    • Private VLANs (PVLANs)
    • Configuring PVLANs
    • Protecting Against Spoof Attacks
    • DHCP Spoof Attack
    • DHCP Snooping
    • DHCP Snooping Configuration Commands
    • Configuring DHCP Snooping
    • MAC Spoof Attack
    • Address Resolution Protocol
    • Commands to Configure Dynamic ARP Inspection
    • Protecting Against ARP Spoofing Attacks
    • Securing Network Switches
    • Vulnerabilities in the Cisco Discovery Protocol
    • Vulnerabilities in the Secure Shell Protocol
    • Vulnerabilities in the Telnet Protocol
    • VTY ACLs
    • Commands to Apply ACLs to VTY
    • STP Security Mechanisms
    • Protecting the Operation of STP
    • BPDU Guard Configuration
    • BPDU Filtering Configuration
    • Root Guard
    • Root Guard Configuration Commands
    • Configuring Root Guard
  • Introduction to Campus Networks
    • Course Introduction
    • Campus Networks as part of an Enterprise Network
    • Devices in a Nonhierarchical Network
    • Layer 2 Network Issues
    • Routed Network Issues
    • What is a Multilayer Switch
    • Issues with Multilayer Switches and VLANs in a Nonhierarchical Network
    • The Enterprise Composite Model
      • Building Access
      • Building Distribution
      • Server Farm Module
      • Campus Core
      • Network Management
    • Benefits of the Enterprise Composite Model
    • Campus Infrastructure Module
  • Defining Virtual Networks (VLANs)
    • Best Practices for VLAN Topologies
      • Issues in a Poorly Designed Network
      • Grouping Business Functions into VLANs
      • Interconnection Technologies
      • Determining Equipment and Cabling Needs
      • Mapping VLANs in a Hierarchical Network
      • Considering Traffic Source to Destination
      • Reviewing Switch Configuration Interfaces
    • Implementing VLANs
      • Benefits of VLANs in an Enterprise Network
      • Local VLANs
      • End-to-End VLANs
      • VLAN Configuration Modes
      • VLAN Access Ports
      • VLAN Implementation Commands
      • Implementing a VLAN
    • Implementing Trunks
      • VLAN Trunks
      • ISL Trunking
      • 802.1Q Trunking
      • 802.1Q Native VLANs
      • Issues with 802.1Q Native VLANs
      • VLAN Ranges
      • Trunking Configuration Commands
      • Configuring Trunking
      • Setting Dynamic Trunking Protocol (DTP)
    • Propagating VLAN Configurations with VTP
      • VTP Domains
      • VTP Protocol
      • VTP Modes
      • VTP Pruning
      • VTP Operation
      • VTP Configuration Commands
      • Configuring a VTP Management Domain
      • Adding New Switches to an Existing VTP
    • Correcting Common VLAN Configuration Errors
      • Issues with 802.1Q Native VLANS
      • Resolving Trunk Link Problems
  • Implementing Spanning Tree
    • Spanning Tree Protocol
      • Transparent Bridges
      • Identifying Traffic Loops
      • Loop Free Network
      • 802.1D Spanning Tree Protocol
      • Root Bridge
      • Port Roles
      • Enhancements to STP
    • Preventing STP Forwarding Loops
      • Unidirectional Link Detection
      • Loop Guard
      • Preventing STP Failures Due to Unidirectional Links
      • Configuring UDLD and Loop Guard
    • Implementing Rapid Spanning Tree Protocol (RSTP)
      • RSTP
      • RSTP Port States
      • RSTP Port Roles
      • Edge Ports
      • RSTP Link Types
      • RSTP BPDU
      • RSTP Proposal and Agreement Process
      • RSTP Topology Change
      • RSTP Implementation Commands
      • Implementing RSTP Commands
    • Implementing the Multiple Spanning Tree Protocol (MSTP)
      • MSTP
      • MSTP Regions
      • Extended System ID
      • Interacting between MSTP regions and 802.1Q
      • MSPT Implementation Commands
      • Configuring and Verifying MSTP
    • Configuring Link Aggregation and EtherChannel
      • EtherChannel
      • PAgP and LACP Protocols
      • EtherChannel Configuration
      • Configuring Port Channels using EtherChannel
      • Configuring Load Balancing over EtherChannel
  • Implementing InterVLAN Routing
    • Routing Between VLANs
      • Multilayer Switching
      • Layer 2 Switch Forwarding Process
      • Inter-VLAN Routing using an External Router
      • Inter-VLAN Routing using External Router Configurtion Commands
      • Configuring Inter-VLAN Routing using an External Router
    • Deploying CEF-Based Multilayer Switching
      • Layer 3 Switching
      • CEF-Based Multilayer Switches
      • Multilayer Switch Packet Forwarding Process
      • CEF Configuration Commands
      • Enabling CEF-Based Multilayer Switching
      • Common CEF problems and Solutions
      • CEF Troubleshooting Commands
      • Troubleshooting CEF-Based Multilayer Switching
    • Enabling Routing Between VLANs
      • Layer 3 Switch Virtual Interfaces
      • Routed Interfaces on a Multilayer Switch
      • Configuration Commands for Inter-VLAN Communication on a Multilayer Switch
      • Configuring Inter-VLAN Routing on a Multilayer Switch
  • Implementing High Availability in a Campus Environment
    • Configuring Layer 3 Redundancy with HSRP
    • Router Redundancy Process
    • Routing Issues
    • HSRP
    • HSRP Operations
    • HSRP States
    • HSRP Configuration Commands
    • Enabling HSRP
    • HSRP Optimization Options
    • Tuning HSRP Operations
    • HSRP Debug Commands
    • Debugging HSRP Operations
    • Configuring Layer 3 Redundancy with VRRP and GLBP
    • Virtual Router Redundancy
    • VRRP Operations Process
    • Gateway Load Balancing Protocol
    • GLBP Operations Process
    • VRRP and GLBP Configuration
    • Enabling VRRP and GLBP
  • Wireless Client Access
    • Introducing Wireless LANs (WLANs)
      • WLANs
      • Similarities Between A LAN and a WLAN
      • Differences Between a LAN and WLAN
      • WLAN Components
      • WLAN Technology Implementations
      • Building Blocks of AP WLAN Topologies
      • Building Blocks of Bridging WLAN Topologies
      • Topology Implementations
    • Wireless Theory and Standards
      • Radio Frequency (RF) Basics
      • WLAN Math
      • Types of Antennas
      • Regulatory Agencies Governing WLANs
      • Operational Standards of IEEE 802.11
      • IEEE 802.11 Standards in the 2.4GHz Band
      • IEEE 802.11a
      • Comparing the 802.11 Standards
    • Implementing WLANs
      • 802.11b/g Channel Reuse
      • 802.11a Channel Reuse
      • WLAN as a Shared Medium - Best Practices
      • Bridging Path Considerations
      • Power Implementation
    • Cisco WLAN
      • Enterprise WLAN Issues
      • Overview of Cisco WLAN
      • Comparing Autonomous and Lightweight WLAN
      • Comparing Core and Advanced Feature Roaming
      • Split MAC Architecture
      • LWAPP AP Association
      • Mixing WLAPP with Autonomous APs
    • Cisco Wireless Clients
      • Wireless Client Association
      • Open Authentication
      • Pre-Shared Key Authentication (WEP)
      • Introducing WLAN Security
      • Cisco Client Cards
      • Cisco Compatible Extensions Program
    • Configuring Basic WLAN
      • Available Interfaces for WLAN Configuration
      • Connect to Controller
      • Configuring the Controller
      • Verify Controller Configuration
  • Configuring Campus Switches to Support Voice
    • Planning for Implementation of Voice in a Campus Network
      • Converged Network Benefits
      • VoIP Network Components
      • Traffic Characteristics of Voice and Data
      • VoIP Call Flow
      • Auxiliary VLANs
      • Quality of Service (QoS)
      • Importance of High Availability for VoIP
      • Power Requirements in Support of VoIP
    • Accommodating Voice Traffic on Campus Switches
      • QoS Trust Boundaries
      • LAN-Based Classification and Marking
      • Basic Switch Commands to Support Attachment of a Cisco IP Phone
      • Configuring a Switch for the Attachment of a Cisco IP Phone
      • What is AutoQoS VoIP?
      • Configuring AutoQoS VoIP on a Catalyst Switch
  • Minimizing Service Loss and Data Theft in a Campus Network
    • Switch Security Issues
    • Overview of Switch Security Concerns
    • Switch Attack Categories
    • MAC Flood Attack
    • Port Security
    • Port Security Configuration
    • Configuring Port Security on a Switch
    • Port Security with Sticky MAC Addresses
    • Unauthorized Access by Rogue Devices
    • 802.1x Port-Based Authentication
    • Protecting Against VLAN Attacks
    • VLAN Hopping
    • Mitigating VLAN Hopping
    • VLAN Access Control Lists (VACLs)
    • Configuring VACLs
    • Private VLANs (PVLANs)
    • Configuring PVLANs
    • Protecting Against Spoof Attacks
    • DHCP Spoof Attack
    • DHCP Snooping
    • DHCP Snooping Configuration Commands
    • Configuring DHCP Snooping
    • MAC Spoof Attack
    • Address Resolution Protocol
    • Commands to Configure Dynamic ARP Inspection
    • Protecting Against ARP Spoofing Attacks
    • Securing Network Switches
    • Vulnerabilities in the Cisco Discovery Protocol
    • Vulnerabilities in the Secure Shell Protocol
    • Vulnerabilities in the Telnet Protocol
    • VTY ACLs
    • Commands to Apply ACLs to VTY
    • STP Security Mechanisms
    • Protecting the Operation of STP
    • BPDU Guard Configuration
    • BPDU Filtering Configuration
    • Root Guard
    • Root Guard Configuration Commands
    • Configuring Root Guard

Confronta questo corso con altri simili
Leggi tutto