You are on page 1of 163

Route-Switch

Switching

Trunking

VTP

Troubleshooting

Spanning Tree Protocol

RSTP

MSTP

Etherchannel

Inter-VLAN routing

Inter-VLAN routing

Multi-layer switching

HSRP

Optimising HSRP

Configuring Layer 3 Redundancy with


VRRP and GLBP

Identifying the VRRP Operations Process

Configuring VRRP

Describing GLBP

Identifying the GLBP Operations Process

Campus switches and voice


Planning for implementation of Voice in a
campus
Accommodating Voice Traffic on campus
switches

Converged Network Benefits

VoIP Network Components

Traffic Characteristics of Voice and Data

VoIP Call Flow

Auxiliary VLANs

QoS

Importance of High Availability for VoIP

Power Requirements in Support of VoIP

QoS and Voice Traffic in the Campus


Module

LAN-Based Classification and Marking

Describing QoS Trust Boundaries

Configuring a Switch for the Attachment


of a Cisco Phone

Basic Switch Commands to Support


Attachment of a Cisco IP Phone

What is AutoQoS VoIP?

Configuring AutoQoS VoIP on a Cisco


Catalyst Switch

Service loss & data theft

Understanding switch security issues


Protecting against VLAN attacks
Protecting against Spoof attacks
Describing STP security mechanisms
Preventing STP forwarding loops
Securing network switches
Security lab exercises

Describing Unauthorized Access by


Rogue Devices

Switch Attack Categories

MAC Flooding Attack

Describing Port Security

Configuring Port Security on a Switch

Port Security with Sticky MAC Addresses

Authentication, Authorization, and


Accounting

Authentication Methods

802.1x Port-Based Authentication

Explaining VLAN Hopping

Mitigating VLAN Hopping

VLAN Access Control Lists

Configuring VACLs

Private VLANs & Protected Ports

Configuring PVLANs

Describing a DHCP Spoof Attack

Describing DHCP Snooping

Configuring DHCP Snooping

Describing ARP Spoofing

Dynamic ARP Inspection

Configuring Dynamic ARP Inspection

Protecting Against ARP Spoofing Attacks

Protecting the Operation of STP

Configuring BPDU Guard

Configuring BPDU Filtering

Root Guard

Configuring Root Guard

Preventing STP Forwarding Loops

Preventing STP Forwarding Loops

Preventing STP Forwarding Loops

Preventing STP Failures Due to


Unidirectional Links

Vulnerabilities in CDP

Telnet Protocol Vulnerabilities

Configuring the Secure Shell Protocol

vty ACLs

Applying ACLs to vty Lines

Best Practices for Switch Security

You might also like