SWITCH: Implementing Cisco IP Switched Networks v2.0 | IT Training & Certification | Info Trek
Respect Your Dreams
Follow through on your goals with courses

SWITCH: Implementing Cisco IP Switched Networks v2.0

  • Private Class Icon
    Private Class
    • All of our private classes are customized to your organization's needs.

      Click on the button below to send us your details and you will be contacted shortly.
    5 Days

Course Details

Expand All

SWITCH - Implementing Cisco IP Switched Networks v2.0 In this course, you will gain the knowledge and skills needed to create an efficient and expandable enterprise network. You will focus on Layer 2 and multilayer switch functions including VLANs, trunks, inter-VLAN routing, port aggregation, spanning tree, first hop redundancy, as well as network security and high availability features.

This course suitable for Network engineers and technicians, Support engineers, Systems engineers, Network analysts, Senior network administrators and Anyone involved in planning, implementing, verifying, and troubleshooting switch-based solutions in enterprise networks

Taking ICND1 v2.0 and ICND2 v2.0 (or CCNAX v2.0) is highly recommended

Know how to:

  • Configure network fundamentals, including the ability to establish Internet, LAN, and WAN connectivity using both IPv4 and IPv6
  • Operate and support a medium-sized LAN that has multiple switches, including VLANs, trunking, and spanning tree functionality
  • Troubleshoot IPv4 and IPv6 connectivity issues Configure and troubleshoot EIGRP and OSPF, for both IPv4 and IPv6
  • Configure devices for SNMP, Syslog, and NetFlow
  • Manage network device security, Cisco device configurations, Cisco IOS images, and licenses
    • ICND1 v2.0 - Interconnecting Cisco Networking Devices, Part 1
    • ICND2 v2.0 - Interconnecting Cisco Networking Devices, Part 2
    • CCNAX v2.0 - CCNA Routing and Switching Boot Camp

This program will be conducted with interactive lectures, PowerPoint presentation, discussions and practical exercise

Upon completion of this program, participants should be able to :

  • Components of the Cisco Enterprise Campus Architecture including the operation of Layer 2 and multilayer switches
  • Switching Database Manager (SDM) templates and how they are used
  • Implementing device features including LLDP and PoE VLANs and trunks and how VTP works
  • Configuring a device to be a DHCP server and relay agent, for both IPv4 and IPv6
  • Configuring Layer 2 and Layer 3 port aggregation
  • Different types of spanning tree protocols and mechanisms, including STP, RSTP, and MST
  • Implementing inter-VLAN routing on both a router and a multilayer switch
  • Network high availability including NTP, SNMPv3, IP SLA, port mirroring, and switch virtualization
  • First hop redundancy protocols for IPv4 and IPv6 including HSRP, VRRP, and GLBP
  • Implementing network security features including port security, storm control, DHCP snooping, IP source guard, dynamic ARP inspection, VLAN ACLs, and private VLANs
  • Using an external authentication server in your network, including implementing IEEE 802.1x

Modules

Expand All
  • Enterprise Campus Architecture
    • Cisco SONA
    • Benefits of the enterprise campus architecture
    • Function of the core layer
    • Impact of traffic types on the network infrastructure
  • Cisco Lifecycle Services and Network Implementation
    • PPDIOO lifecycle approach
    • PPDIOO implementation planning


  • Best Practices for VLAN Topologies
    • VLAN segmentation models
    • Creating an implementation plan
    • Implementation choices and their consequences
    • Implementation and verification plans for a VLAN network with end-to-end VLANs and trunks and VLAN Trunk Protocol (VTP)
  • Configuring Private VLANs (PVLANs)
    • Configure isolated and community PVLANs
    • Implementation and verification plans for a VLAN network design that contains PVLANs
    • Configure PVLANs across multiple switches
  • Configuring Link Aggregation with EtherChannel
    • Benefits of EtherChannel
    • Compare the PAgP and the LACP
    • Create and execute an implementation and verification plan in a VLAN network with Layer 2 EtherChannel links and load balancing among the ports included in an EtherChannel


  • Spanning Tree Protocol (STP) Enhancements
    • STP standards and operations
    • Implement and configure PVRST+ and MSTP
    • RSTP port roles
    • Verify RSTP configurations
  • STP Stability Mechanisms
    • Protect and optimize the operation of STP
    • Configure BPDUGuard, BPDUFilter, RootGuard, and LoopGuard
    • Configure UDLD to detect and shut down unidirectional links


  • Routing Between VLANs
    • Configure and verify inter-VLAN routing in a Layer 2 topology using an external router, a switch SVI, or a switch-routed interface
    • Configure both a switch and router to accommodate inter-VLAN packet transfer using an external router
    • Layer 3 SVI
    • Commands used to configure an SVI
    • A routed port on a multilayer switch
    • Commands used to configure a routed port on a multilayer switch
    • Configure Layer 3 EtherChannel links
    • Configure inter-VLAN routing on a multilayer switch
    • Configure DHCP services on a Layer 3 switch
  • Deploying Multilayer Switching with Cisco Express Forwarding
    • Configure and verify inter-VLAN routing in a Layer 2 topology using multilayer switching with Cisco Express Forwarding
    • Multilayer switching and how it differs when you are performing Layer 2 vs. Layer 3 switching
    • Packet and frame header rewriting performed by a multilayer switch
    • Layer 3 switch processing
    • Switching methods available on a Cisco switch
    • Configure Cisco Express Forwarding on a Cisco switch


  • High Availability
    • Uses, requirements, benefits, and performance expectations
    • Resiliency for high availability
    • Design the network for optimal redundancy
  • Implementing High Availability
    • Use Cisco StackWise technology on access switches
    • Evaluate the impact of too little redundancy
    • Assess the impact of uplink failure
  • Implementing Network Monitoring
    • Configure IP SLA technology


  • Configuring Layer 3 Redundancy with HSRP
    • Routing issues
    • Router redundancy process
    • Configure HSRP operations
    • Fine-tune and troubleshoot HSRP
  • Configuring Layer 3 Redundancy with VRRP and GLBP
    • VRRP operations process
    • Configure VRRP
    • GLBP operations process
    • Configure GLBP


  • Switch Security Issues
    • Switch and Layer 2 security as a subset of an overall network security plan
    • How a rogue device gains unauthorized access to a network
    • Categorize switch attack types and list mitigation options
    • How a MAC flooding attack overflows a CAM Campus Backbone Layer table
    • How port security is used to block input from devices based on Layer 2 restrictions
    • Configure port security on a switch
    • Authentication methods using AAA
    • Port-based authentication using 802.1X
  • Protecting Against VLAN Attacks
    • VLAN hopping
    • Configure a switch to mitigate VLAN hopping attacks
    • VACLs and their purpose as part of VLAN security
    • Configure VACLs
  • Protecting Against Spoofing Attacks
    • DHCP spoofing attacks
    • Configure DHCP snooping
    • ARP poisoning
    • Protect against ARP spoofing attacks with DAI
  • Securing Network Services
    • Cisco Discovery Protocol and LLDP vulnerabilities
    • Telnet protocol vulnerabilities
    • Configure SSH
    • Configure vty ACLs
    • Configure Cisco IOS secure HTTP server
    • Switch security considerations


  • Planning for Support of Voice in a Campus Network
    • Components of a VoIP network and IP telephony
    • Bandwidth consumption of voice traffic vs. data traffic
    • Video bandwidth consumption vs. voice and data bandwidth consumption
    • Solve for latency, jitter, bandwidth, packet loss, and reliability
    • Security for voice and video traffic integration into a data network
  • Integrating and Verifying VoIP in a Campus Infrastructure
    • Plan for VoIP requirements
    • Voice VLANs
    • Configure and Verify Voice VLANs
    • Plan PoE requirements and configure PoE
    • Provide additional services required by VoIP devices
    • Create a Test Plan for VoIP integration
  • Accommodate Voice and Video on Campus Switches
    • High availability applied to VoIP or video traffic
    • Build an integrated voice/video/data campus network
    • The need for QoS for VoIP and video integration
    • Configure basic QoS for voice and video VLANs


  • Comparing WLANs with Campus Networks
    • Compare wired and wireless LAN
    • Main wireless LAN topologies
    • Settings specific to WLANs, such as SSIDs, and WLAN-to-VLAN mapping
  • Assessing the Impact of WLANs on Campus Networks
    • WLAN implementations
    • Compare WLAN solutions
    • Assess traffic flow and impact on the campus LAN of an autonomous AP configuration and a controller-based configuration
  • Preparing the Campus Infrastructure for WLANs
    • Best placement for APs and controllers
    • Configure switches for WLAN devices
    • Gather WLAN requirements
    • Plan WLAN integration
    • Create a test plan

Labs

Lab 1: New Hire Test

  • Prepare basic configuration templates for your switches
  • Explore the remote lab device connections
  • Deploy configuration templates on your switches
  • Verify your configurations according to the verification plan you created

Lab 2: Design and Implement VLANs, Trunks, and EtherChannel

  • Plan a segmented Layer 2 network implementation
  • Create a Layer 2 implementation and verification plan
  • Implement a full Layer 2 solution including VLANs, trunks, pruning, VTP, and EtherChannel

Lab 3: Troubleshoot Common VLAN Configuration and Security Issues

  • Diagnose and resolve Layer 2 connectivity problems
  • Diagnose and resolve VLAN and EtherChannel-related problems
  • Document troubleshooting progress, configuration changes, and problem resolution

Lab 4: Configure Private VLANs

  • Plan a segmented private VLAN implementation
  • Create a private VLAN implementation and verification plan
  • Implement private VLANs

Lab 5: Implement Multiple Spanning Tree

  • Design a spanning tree
  • Create a spanning tree implementation plan
  • Implement a spanning tree according to an implementation plan
  • Create a spanning tree verification plan
  • Verify the spanning tree according to the verification plan

Lab 6: Implement PVSRT+

  • Design a migration plan to PVRST+
  • Create a PVRST+ implementation plan
  • Implement PVRST+ according to implementation plan
  • Create a PVRST+ verification plan
  • Verify the PVRST+ spanning tree according to the verification plan

Lab 7: Troubleshoot Spanning Tree Issues

  • Develop a work plan to troubleshoot configuration and security issues in the STP
  • Isolate the causes of the problems
  • Correct all of the identified spanning tree issues
  • Document and report the troubleshooting findings and recommendations

Lab 8: Implement Inter-VLAN Routing

  • Design a Layer 3 network
  • Create an implementation requirements list
  • Create a step-by-step implementation and verification plan
  • Implement and verify inter-VLAN routing and routing protocols

Lab 9: Troubleshoot Inter-VLAN Routing

  • Develop a work plan to troubleshoot configuration and inter-VLAN routing issues
  • Isolate the causes of the problems
  • Correct all of the identified routing issues
  • Test the corrections made
  • Document and report the troubleshooting findings and recommendations

Lab 10: Implement High Availability in a Network Design

  • Design a high availability solution consisting of a syslog, SNMP reporting, and an IP SLA solution
  • Create an implementation requirements list
  • Create a step-by-step implementation and verification plan
  • Implement and verify your solution

Lab 11: Implement and Tune HSRP

  • Design an HSRP solution
  • Create an implementation requirements list
  • Create a step-by-step implementation and verification plan
  • Implement and verify your solution

Lab 12: Implement VRRP

  • Design a VRRP solution
  • Create an implementation requirements list
  • Create a step-by-step implementation and verification plan
  • Implement and verify your solution

Lab 13: Secure Network Switches to Mitigate Security Attacks

  • Perform a baseline assessment of network switch security settings
  • Identify possible threats, points of attack, and vulnerability points in the network
  • Write an implementation plan to implement security measures on network switches
  • Write a plan to test and verify security threat mitigation measures for VLANs
  • Configure port security and other switch security features
  • Configure a VACL
  • Verify the correct implementation of security measures
  • Document the switch and VLAN security plan, settings, operations, and maintenance

Lab 14: Plan Implementation and Verification of VoIP in a Campus Network

  • Gather information regarding the implementation of VoIP
  • Prepare an implementation requirements list for VoIP readiness
  • Prepare an implementation and verification plan
  • Implement and verify the VoIP readiness plan

Lab 15: Integrate Wireless in the Campus

  • Determine requirements for implementing wireless structure in a network
  • Prepare an implementation plan for wireless integration
  • Prepare the switched network for integration of wireless equipment
  • Verify that the switched network was properly provisioned


Trainers

Reviews

0
based on 0 ratings reviews