This course teaches students how to implement, monitor, and maintain switching in converged enterprise networks. Students will learn how to plan, configure, and verify the implementation of complex enterprise switching solutions using the Cisco Enterprise Campus Architecture. The course also covers the secure integration of VLANs, WLANs, voice, and video into campus networks. Comprehensive labs emphasize hands-on learning and practice to reinforce configuration skills.
Course Prerequisites: None. CCNA-level knowledge and skills required.
|
Objectives | |
Chapter 1. Analyzing the Cisco Enterprise Campus Architecture | Review and assess the structure and components used to build or expand a network in the Campus Infrastructure module of the Cisco Enterprise Architecture | |
1.1 Campus Network Design Principles | Describe common campus design options and how design choices affect implementation and support of a campus LAN | |
1.2 Applying the Lifecycle Approach to Campus Design | Describe managing and supporting a campus LAN using a network life-cycles approach | |
Chapter 2. Implementing VLANs in Campus Networks | Implement VLANs in campus networks | |
2.1 Implementing VLAN Technologies in a Campus Network | Given a large enterprise network design, plan VLAN technologies, trunks, and addressing schemes to meet business and technical requirements and constraints | |
2.2 Configuring VLANs and Trunks | Configure VLANs and VLAN trunks in a campus network to support business and technical requirements | |
2.3 Configuring Link Aggregation | Given a design, addressing scheme, and business/technical requirements and constraints, configure and verify an EtherChannel in a Layer 2 topology that contains bridging loops | |
Chapter 3. Implementing Spanning Tree | Implement, monitor, and maintain switching in the Cisco Enterprise Campus Architecture | |
3.1 Spanning Tree Protocols | Describe spanning tree protocols | |
3.2 Configuring Spanning Tree | Given a network topology and business and technical requirements and constraints, configure and verify spanning tree protocols in a Layer 2 topology that contains bridging loops | |
3.3 Spanning Tree Enhancements | In a given network topology, configure STP features to enhance resiliency and prevent forwarding loops | |
3.4 Troubleshooting Spanning Tree Issues | Given a campus VLAN topology and spanning tree installation in an enterprise network, troubleshoot spanning tree issues | |
Chapter 4. Implementing InterVLAN Routing | Implement, monitor, and maintain switching in the Cisco Enterprise Campus Architecture | |
4.1 Describing InterVLAN Routing | Explain methods of interVLAN routing | |
4.2 Configuring InterVLAN Routing | Configure and verify interVLAN routing in a Layer 2 topology using multilayer switching | |
4.3 Implementing Dynamic Host Configuration Protocol in a Multilayer Switched Environment | Explain DHCP operation and configure DHCP | |
4.4 Deploying CEF-Based Multilayer Switching | Configure and verify interVLAN routing in a Layer 2 topology using CEF-based multilayer switching | |
Chapter 5. Implementing High Availability and Redundancy in a Campus Network | Configure and optimize high availability and redundancy on switches to provide Layer 3 redundancy | |
5.1 Implementing and Monitoring High Availability | Implement and monitor high availability | |
5.2 Understanding Supervisor Redundancy | Describe switch supervisor redundancy | |
5.3 Understanding Gateway Redundancy Protocols | Describe gateway redundancy protocols | |
5.4 Configuring Layer 3 Redundancy with HSRP, VRRP, and GLBP | Configure and verify gateway redundancy protocols | |
5.5 Implementing Server Load Balancing | Configure and verify Cisco IOS server load balancing (SLB) | |
Chapter 6. Securing the Campus Infrastructure | Describe and implement LAN security features | |
6.1 Switch Security Fundamentals | Identify attacks and threats to switches and methods to mitigate attacks | |
6.2 VLAN Attacks | Configure tight control of trunk links to mitigate VLAN hopping attacks | |
6.3 MAC-Based Attacks | Configure switches to guard against MAC-based attacks | |
6.4 Spoof Attacks | Configure switches to guard against DHCP, MAC, and address resolution protocol (ARP) threats | |
6.5 Securing Network Switches | Secure Layer 2 devices | |
6.6 Troubleshooting Performance and Connectivity | Describe tools used to monitor and analyze network traffic | |
Chapter 7. Preparing the Campus Infrastructure for Advanced Services | Plan and prepare for advanced services in a campus infrastructure | |
7.1 Assessing Converged Traffic in the Campus Infrastructure | Assess the impact of WLANs, voice, and video on campus infrastructure operations | |
7.2 Understanding QoS | Describe quality of service in a campus infrastructure to support advanced services | |
7.3 Implementing IP Multicast | Implement multicast in a campus infrastructure to support advanced services | |
7.4 Preparing the Campus Infrastructure to Support Wireless | Prepare campus networks for the integration of wireless LANs | |
7.5 Preparing the Campus Infrastructure to Support Voice | Prepare campus networks for the integration of voice capabilities | |
7.6 Preparing the Campus Infrastructure to Support Video | Prepare campus networks for the integration of video capabilities |