CCNP Routing & Switching – SWITCH

Implementing Cisco IP Switched Networks (SWITCH)

Exam Number 300-115 SWITCH
Associated Certifications CCNP Routing and Switching
CCDP
Duration 120 minutes (45-65 questions)
Available Languages English, Japanese
Register Pearson VUE
Exam Policies Read current policies and requirements
Exam Tutorial Review type of exam questions

 

This exam certifies the switching knowledge and skills of successful candidates. They are certified in planning, configuring, and verifying the implementation of complex enterprise switching solutions that use the Cisco Enterprise Campus Architecture.

 

Review the exam topics

[mpc_tabs preset=”mpc_preset_1″ tabs_position=”left” active_tab=”0″ decor_line=”true” decor_color=”#5e5e5e” decor_size=”2″ decor_gap=”5″ font_preset=”mpc_preset_1″ font_color=”#888888″ font_size=”15″ font_line_height=”1.75″ font_transform=”none” font_align=”left” content_padding_divider=”true” content_padding_css=”padding-right:10px;padding-left:20px;” padding_divider=”true” margin_divider=”true” margin_css=”margin-right:20px;margin-left:20px;” mpc_button__preset=”mpc_preset_48″ mpc_button__font_preset=”mpc_preset_20″ mpc_button__font_color=”#ffffff” mpc_button__font_size=”12″ mpc_button__font_transform=”uppercase” mpc_button__background_color=”#555555″ mpc_button__border_css=”border-width:2px;border-color:#555555;border-style:solid;border-radius:3px;” mpc_button__padding_divider=”true” mpc_button__padding_css=”padding-top:9px;padding-right:18px;padding-bottom:9px;padding-left:18px;” mpc_button__hover_font_color=”#555555″ mpc_button__hover_icon_color=”#f3f3f3″ mpc_button__hover_background_color=”#f3f3f3″ mpc_button__hover_background_effect=”expand-diagonal_left” mpc_button__hover_background_offset=”110″ mpc_button__hover_border_css=”border-color:#f3f3f3;border-style:solid;border-radius:5px;” button_margin_divider=”true” button_margin_css=”margin-top:5px;margin-right:15px;margin-bottom:15px;”][mpc_tab title=”Chapter I” tab_id=”1530158992-1-68″]

Chapter 1. Fundamentals Review

[Online Course] 1. Switching Introduction

    1. Switching Introduction

        1.1 Hubs and Switches

        1.2 Bridges and Switches

        1.3 Switches of Today

        1.4 Broadcast Domains

        1.5 MAC Addresses

        1.6 The Basic Ethernet Frame Format

        1.7 Basic Switching Function

        1.8 VLANs

        1.9 The Spanning Tree Protocol

        1.10 Trunking

        1.11 Port Channels

        1.12 Multilayer Switching

[/mpc_tab][mpc_tab title=”Chapter II” tab_id=”1530158992-2-69″]

Chapter 2. Network Design Fundamentals

    1. Campus Network Structure

        1.1 Hierarchical Network Design

        1.2 Access Layer

        1.3 Distribution Layer

        1.4 Core Layer (Backbone)

        1.5 Layer 3 in the Access Layer

        1.6 The Cisco Enterprise Campus Architecture

        1.7 The Need for a Core Layer

    2. Types of Cisco Switches

        2.1 Comparing Layer 2 and Multilayer Switches

        2.2 MAC Address Forwarding

        2.3 Layer 2 Switch Operation

        2.4 Layer 3 (Multilayer) Switch Operation

        2.5 Useful Commands for Viewing and Editing Catalyst Switch MAC Address Tables

        2.6 Frame Rewrite

        2.7 Distributed Hardware Forwarding

        2.8 Cisco Switching Methods

        2.9 Route Caching

        2.10 Topology-Based Switching

        2.11 Hardware Forward Details

[/mpc_tab][mpc_tab title=”Chapter III” tab_id=”1530159625951-2-0″]

Chapter 3. Campus Network Architecture

    1. Implementing VLANs and Trunks in Campus Environment

        1.1 VLAN Overview

        1.2 VLAN Segmentation

        1.3 End-to-End VLANs

        1.4 Local VLANs

        1.5 Comparison of End-to-End VLANs and Local VLANs

        1.6 Mapping VLANs to a Hierarchical Network

        1.7Implementing a Trunk in a Campus Environment

        1.8 Understanding Native VLAN in 802.1Q Trunking

        1.9 Understanding DTP

    2. VLAN Ranges and Mappings

        2.1 Configuring, Verifying, and Troubleshooting VLANs and Trunks

        2.2 Verifying the VLAN Configuration

        2.3 Configuring VLANs and Trunks

        2.4 Best Practices for VLANs and Trunking

        2.5 Voice VLAN Overview

        2.6 Switch Configuration for Wireless Network Support

    3. VLAN Trunking Protocol

        3.1 VTP Overview

        3.2 VTP Modes

        3.3 VTP Versions

        3.4 VTP Pruning

        3.5 VTP Authentication

        3.6 VTP Advertisements

        3.7 VTP Messages Types

        3.8 Summary Advertisements

        3.9 Subset Advertisements

        3.10 Configuring and Verifying VTP

        3.11 Overwriting VTP Configuration (Very Common Issue with VTP)

        3.12 Best Practices for VTP Implementation

    4. Implementing EtherChannel in a Switched Network

        4.1 The Need for EtherChannel

        4.2 EtherChannel Mode Interactions

        4.3 LACP

        4.4 PAgP

        4.5 Layer 2 EtherChannel Configuration Guidelines

        4.6 EtherChannel Load-Balancing Options

        4.7 Configuring EtherChannel in a Switched Network

        4.8 EtherChannel Configuration and Load Balancing

        4.9 EtherChannel Guard

[/mpc_tab][mpc_tab title=”Chapter IV” tab_id=”1530159627094-3-5″]

Chapter 4. Spanning Tree in Depth

    1. Spanning Tree Protocol Overview

        1.1 STP Need

        1.2 STP Standards

        1.3 STP Operations

        1.4 Bridge Protocol Data Units

        1.5 Root Bridge Election

        1.6 Root Port Election

        1.7 Designated Port Election

        1.8 STP Port States

        1.9 Per-VLAN STP Plus (PVST+)

        1.10 STP Topology Changes

    2. Rapid Spanning Tree Protocol

        2.1 RSTP Port Roles

        2.2 Comparison of RSTP and STP Port States

        2.3 RSTP Topology Changes

        2.4 RSTP Link Types

        2.5 Configuring and Modifying STP Behavior

        2.6 Changing STP Priority

        2.7 STP Path Manipulation

        2.8 STP Timers

    3. Implementing STP Stability Mechanisms

        3.1 Use UplinkFast

        3.2 Use BackboneFast

        3.3 Use PortFast

        3.4 Securing PortFast Interface with BPDU Guard

        3.5 Disabling STP with BPDU Filter

        3.6 Use Root Guard

        3.7 Loop Guard Overview

        3.8 Use UDLD

        3.9 UDLD Recommended Practices

        3.10 Use FlexLinks

        3.11 STP Stability Mechanisms Recommendations

    4. Configuring Multiple Spanning Tree Protocol

        4.1 Introducing MST

        4.2 MST Regions

        4.3 STP Instances with MST

        4.4 Extended System ID for MST

        4.5 Configuring and Verifying MST

        4.6 Configuring MST Path Cost

        4.7 Configuring MST Port Priority

        4.8 MST Protocol Migration

        4.9 MST Recommended Practices

    5. Troubleshooting STP

        5.1 Potential STP Problems

        5.2 Duplex Mismatch

        5.3 Unidirectional Link Failure

        5.4 Frame Corruption

        5.5 Resource Errors

        5.6 PortFast Configuration Errors

[/mpc_tab][mpc_tab title=”Chapter V” tab_id=”1530159628226-4-8″]

Chapter 5 Inter-VLAN Routing

    1. Describing Inter-VLAN Routing

        1.1 Introduction to Inter-VLAN Routing

        1.2 Inter-VLAN Routing Using an External Router

        1.3 Configuring Inter-VLAN Routing Using an External Router

        1.4 Routing with an External Router

        1.5 External Routers: Advantages Disadvantages

        1.6 Inter-VLAN Routing Using Switch Virtual Interfaces

        1.7 SVI: Advantages and Disadvantages

        1.8 Routing with Routed Ports

        1.9 Routed Ports: Advantages

        1.10 Configuring Inter-VLAN Routing Using SVI and Routed Ports

        1.11 Routing on a Multilayer Switch

        1.12 Using the SVI autostate exclude Command

        1.13 SVI Configuration Checklist

        1.14 Troubleshooting Inter-VLAN Problems

        1.15 Example of a Troubleshooting Plan

    2. Layer 2 Versus Layer 3 EtherChannel

        2.1 Layer 3 EtherChannel Configuration

        2.2 Verifying Routing Protocols

    3. Implementing DHCP

        3.1 DHCP Overview

        3.2 Configuring DHCP in Multilayer Switched Network

        3.3 Configuring a DHCP Relay

        3.4 Configuring DHCP Options

[/mpc_tab][mpc_tab title=”Chapter VI” tab_id=”1530163309543-5-10″]

Chapter 6. First-Hop Redundancy

    1. Overview of FHRP and HSRP

        1.1 The Need for First-Hop Redundancy

        1.2 HSRP Overview

        1.3 HSRP State Transition

        1.4 Aligning HSRP with STP Topology

        1.5 Configuring and Tuning HSRP

        1.6 Forwarding Through the Active Router

        1.7 Load Sharing with HSRP

        1.8 The Need for Interface Tracking with HSRP

        1.9 HSRP Interface Tracking

        1.10 HSRP and Object Tracking

        1.11 Configuring HSRP Authentication

        1.12 Tuning HSRP Timers

        1.13 HSRP Versions

    2. Configuring Layer 3 Redundancy with VRRP

        2.1 About VRRP

        2.2 Configuring VRRP and Spotting the Differences from HSRP

        2.3 VRRP and Authentication

        2.4 Tracking and VRRP

        2.5 Configuring Layer 3 Redundancy with GLBP

        2.6 Introducing GLBP

        2.7 Comparing GLPB to HSRP

        2.8 GLBP States

        2.9 Configuring and Verifying GLBP

        2.10 GLBP Load-Balancing Options

        2.11 GLBP Authentication

        2.12 GLBP and STP

        2.13 Tracking and GLBP

[/mpc_tab][mpc_tab title=”Chapter VII” tab_id=”1530163723275-6-8″]

Chapter 7. Network Management

    1. AAA

        1.1 Authentication Options

        1.2 RADIUS and TACACS+ Overview

        1.3 RADIUS Authentication Process

        1.4 TACACS+ Authentication Process

        1.5 Configuring AAA

        1.6 Configuring RADIUS for Console and vty Access

        1.7 Configuring TACACS+ for Console and vty Access

        1.8 AAA Authorization

        1.9 AAA Accounting

        1.10 Limitations of TACACS+ and RADIUS

    2. Identity-Based Networking

        2.1 IEEE 802.1X Port-Based Authentication Overview

        2.2 IEEE 802.1X Configuration Checklist

    3. Network Time Protocols

        3.1 The Need for Accurate Time

        3.2 Configuring the System Clock Manually

        3.3 Network Time Protocol Overview

        3.4 NTP Modes

        3.5 Other NTP Configuration Options

        3.6 NTP Example

        3.7 NTP Design Principles

        3.8 Securing NTP

        3.9 NTP Source Address

        3.10 NTP Versions

        3.11 SNTP

        3.12 PTP/IEEE-1588

    4. SNMP

        4.1 SNMP Overview

        4.2 SNMP Versions

        4.3 SNMP Best Practices

        4.4 SNMPv3 Configuration Example

        4.5 Verifying SNMP Version 3 Configuration

[/mpc_tab][mpc_tab title=”Chapter VIII” tab_id=”1530164119765-7-4″]

Chapter 8. Switching Features and Technologies for the Campus Network

    1. Discovery Protocols

        1.1 Introduction to LLDP

        1.2 Basic Configuration of LLDP

        1.3 Discovering Neighbors Using LLDP

    2. Unidirectional Link Detection

        2.1 UDLD Mechanisms and Specifics

        2.2 UDLD Configuration

        2.3 Leveraging UDLD and STP Loop Guard Together

    3. Power over Ethernet

        3.1 PoE Components

        3.2 PoE Standards

        3.3 PoE Negotiation

        3.4 Configuring and Verifying PoE

    4. SDM Templates

        4.1 SDM Template Types

        4.2 Choosing the Right SDM Template

        4.3 System Resource Configuration on Other Platforms

    5. Monitoring Features

        5.1 SPAN and RSPAN Overview

        5.2 SPAN Configuration

        5.3 RSPAN Configuration

    6. IP SLA

        6.1 Introduction to IP SLA

        6.2 IP SLA Source and Responder

        6.3 IP SLA Configuration

        6.4 IP SLA Operation with Responder

        6.5 IP SLA Time Stamps

        6.6 Configuring Authentication for IP SLA

        6.7 IP SLA Example for UDP Jitter

[/mpc_tab][mpc_tab title=”Chapter IX” tab_id=”1530796655160-8-8″]

Chapter 9. High Availability

    1. The Need for Logical Switching Architectures

    2. What Is StackWise?

        2.1 StackWise Benefits

        2.2 Verifying StackWise

    3. What Is VSS?

        3.1 VSS Benefits

        3.2 Verifying VSS

    4. Redundant Switch Supervisors

        4.1 Supervisor Redundancy Modes

        4.2 Stateful Switchover

    5. Nonstop Forwarding

[/mpc_tab][mpc_tab title=”Chapter X” tab_id=”1530796825903-9-8″]

Chapter 10. Campus Network Security

    1. Overview of Switch Security Issues

    2. Cisco Switch Security Configuration Best Practices

    3. Campus Network Vulnerabilities

        3.1 Rogue Access

        3.2 Switch Vulnerabilities

        3.3 MAC Flooding Attacks

    4. Introducing Port Security

        4.1 Port Security Configuration

        4.2 Port Error Conditions

        4.3 Err-Disabled Automatic Recovery

        4.4 Port Access Lists

    5. Storm Control

        5.1 Introduction to Storm Control

        5.2 Configuring and Verifying Storm Control on an Interface

    6. Mitigating Spoofing Attacks

        6.1 DHCP Spoofing Attacks

        6.2 DHCP Snooping

        6.3 DHCP Option 82

        6.4 DHCP Snooping Example Configuration

        6.5 IP Source Guard

        6.6 IPSG Configuration

        6.7 ARP Spoofing

        6.8 Dynamic ARP Inspection

        6.9 DAI Configuration

    7. Securing VLAN Trunks

        7.1 Switch Spoofing

        7.2 VLAN Hopping

        7.3 Protecting Against VLAN Hopping

        7.4 VLAN Access Lists

        7.5 VACL Interaction with ACLs and PACLs

        7.6 Configuring VACLs

    8. Private VLANs

        8.1 Introduction to PVLANs

        8.2 PVLAN Port Types

        8.3 PVLAN Configuration

        8.4 PVLAN Verification

        8.5 PVLANs Across Multiple Switches

        8.6 Using the Protected Port Feature

[/mpc_tab][/mpc_tabs]

IT Best-Path

IT Best-Path 사이트는 IT 엔지니어분들에게
기술에 대하여 온라인으로 학습할 수 있도록
유·무료 교육자료를 제공하는 사이트입니다.

지엔컨설팅(주) | 대표이사 이경태

서울특별시 동작구 동작대로 149, 2층
TEL. 070-7633-4466
FAX. 070-8270-4466
E-mail. master@itbestpath.com

사업자등록정보

사업자등록번호: 105-87-27154
통신판매업신고: 2009-서울동작-0235
학원설립·운영등록번호: 제2639호
개인정보관리책임자: 이경태

top
Copyright© IT BEST-PATH. All Rights Reserved.

로그인

회원가입

계정 생성하기
X