> > > SWITCH Detailed outline

Implementing Cisco IP Switched Networks (SWITCH)

Course Description Schedule Course Outline

Detailed Course Outline

Basic Concepts and Network Design

  • Analyzing Campus Network Structure
  • Comparing Layer 2 and Multilayer Switches
  • Using Cisco SDM Templates
  • Implementing LLDP
  • Implementing PoE

Campus Network Architecture

  • Implementing VLANs and Trunks
  • Introducing VTP
  • Implementing DHCP
  • Implementing DHCP for IPv6
  • Configuring Layer 2 Port Aggregation

Spanning Tree Implementation

  • Implementing RSTP
  • Implementing STP Stability Mechanisms
  • Implementing Multiple Spanning Tree Protocol

Configuring Inter-VLAN Routing

  • Implementing Inter-VLAN Routing Using a Router
  • Configuring a Switch to Route

Implementing High Availability Networks

  • Configuring Network Time Protocol
  • Implementing SNMP Version 3
  • Implementing IP SLA
  • Implementing Port Mirroring for Monitoring Support
  • Verifying Switch Virtualization

First Hop Redundancy Implementation

  • Configuring Layer 3 Redundancy with HSRP
  • Configuring Layer 3 Redundancy with VRRP
  • Configuring Layer 3 Redundancy with GLBP
  • Configuring First Hop Redundancy for IPv6

Campus Network Security

  • Implementing Port Security
  • Implementing Storm Control
  • Implementing Access to External Authentication
  • Mitigating Spoofing Attacks
  • Securing VLAN Trunks
  • Configuring Private VLANs

Challenge Labs

  • Lab 1: Network Discovery
  • Lab 2: Configure DHCP
  • Lab 3: Configure DHCPv6
  • Lab 4: Configure EtherChannel
  • Lab 5: Implementing Rapid Spanning Tree
  • Lab 6: Improving STP Configuration
  • Lab 7: Configure MST
  • Lab 8: Configure Routing Between VLANs Using a Router
  • Lab 9: Configure Routing on a Multilayer Switch
  • Lab 10:Configure NTP
  • Lab 11:Configure Network Monitoring Using IP SLA
  • Lab 12: Configure HSRP With Load Balancing
  • Lab 13: Configure VRRP With Load Balancing
  • Lab 14: Implement GLBP
  • Lab 15: Configure HSRP for IPv6
  • Lab 16:Controlling Network Access Using Port Security
 

Cookies help us deliver our services. By using our services, you agree to our use of cookies.   Got it!