Learn your way! Get started

Cisco Implementing Cisco IP Switched Networks (CCNP Switch)

with expert Kenneth Mayer


Course at a glance


Release date 7/3/2018
Level
Runtime 16h 15m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

The Implementing Cisco IP Switched Networks training is designed to help students prepare for Cisco CCNP(R) certification. The SWITCH course is one of three components in the CCNP curriculum. SWITCH is designed for network engineers with at least one year of professional work experience, who are ready to advance their skills and work independently on complex network solutions. Students will learn to plan, configure and verify the implementation of complex enterprise switching solutions using Cisco's Campus Enterprise Architecture. The course also covers secure integration of VLANs, WLANs, voice and video traffic into campus networks.

Meet the expert

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.

Course outline



Network Design

Network Design (27:39)
  • Introduction (00:12)
  • Hierarchical Design (09:12)
  • Access Layer (04:57)
  • Distribution Layer (05:59)
  • Core Layer (02:42)
  • Collapsed Core Option (02:31)
  • Collapsed Core (01:56)
  • Summary (00:08)
Switch Types (51:26)
  • Introduction (00:08)
  • Types of Switches (04:23)
  • Routed vs. Switched Architecture (02:54)
  • Layer 2 Switching (04:33)
  • Other Switchng Tables (14:26)
  • Multilayer Switching at the Access Layer (12:01)
  • How the Frame is Re-written at L3 (10:06)
  • Cisco Distributed Hardware Model (02:44)
  • Summary (00:08)
Switching Methods (02:31:33)
  • Introduction (00:08)
  • Introduction (00:00)
  • Switching Methods eNotes (29:02)
  • Route Caching (21:07)
  • Topology-Based Switching (19:57)
  • What Is SDM (18:11)
  • The New CDP (16:34)
  • Turn LLDP on (14:34)
  • What Power Options You Have (11:20)
  • What Can You Power and PoE (09:02)
  • PoE eNotes (06:12)
  • PoE Negotiation (02:32)
  • Enabling PoE (01:40)
  • Summary (00:59)
  • Summary (00:08)

VLANs and Trunking

VLAN (01:15:30)
  • Introduction (00:12)
  • VLAN Configuration (02:25)
  • Demo: VLAN Basics (05:44)
  • Demo: Create VLAN (04:45)
  • Demo: Set up VLANs (05:19)
  • Demo: Empty VLANs (03:14)
  • CAM (00:00)
  • CAM/VLAN eNotes (28:41)
  • Why VLANs? (24:57)
  • Summary (00:08)
Trunking (19:33)
  • Introduction (00:08)
  • Trunking (04:18)
  • DTP (02:25)
  • Demo: Review (01:20)
  • Demo: Trunking (04:16)
  • Demo: Ranges (06:55)
  • Summary (00:08)
Trunking Connections (22:58)
  • Introduction (00:08)
  • Native VLAN (02:02)
  • Trunk Connections (02:36)
  • End-to-End VLAN (01:43)
  • VLAN Types eNotes (04:30)
  • Voice VLANs (02:57)
  • Demo: Voice VLANs (05:09)
  • Demo: Connect Voice Devices (03:42)
  • Summary (00:08)

VTP and DHCP

Connecting the Access Point (18:18)
  • Introduction (00:08)
  • Connecting the AP (04:20)
  • VLAN Trunking Protocol (02:41)
  • VTP Modes eNotes (09:11)
  • VTP Review (01:48)
  • Summary (00:08)
VTP Versions (23:57)
  • Introduction (00:08)
  • VTP Versions (06:21)
  • Demo: VTP (04:58)
  • Demo: Automatic Domain Joining (06:18)
  • Configure Client IP Addresses (06:02)
  • Summary (00:08)
DHCP Commands (18:35)
  • Introduction (00:08)
  • DHCP Commands (04:58)
  • DHCP Bindings (01:28)
  • Demo: Configure DHCP Server (05:11)
  • Demo: Assign DHCP Server (05:52)
  • DHCP Broadcasts (00:48)
  • Summary (00:08)

IPv6 and EtherChannel

DHCP and IPV6 (13:56)
  • Introduction (00:08)
  • DHCP and IPv6 (02:13)
  • SLAAC eNotes (09:00)
  • DHCP in IPv6 (02:26)
  • Summary (00:08)
IPv6 Demo (22:18)
  • Introduction (00:08)
  • Demo: Introduction (05:39)
  • Demo: IPv6 (04:27)
  • Demo: Configure DHCP (05:25)
  • Demo: Prefix Delegation (06:28)
  • Summary (00:08)
EtherChannel Protocols (23:53)
  • Introduction (00:08)
  • EtherChannel Protocols (04:28)
  • EtherChannel Requirements (03:33)
  • What Must Match (01:39)
  • Demo: EtherChannel (05:46)
  • EtherChannel Load Balancing (04:46)
  • Demo: Load Balancing (03:22)
  • Summary (00:08)

Spanning Tree Protocol

Spanning Tree (17:49)
  • Introduction (00:12)
  • Types of STP (06:31)
  • STP Operation eNotes (05:56)
  • BPDU eNotes (05:01)
  • Summary (00:08)
Root Bridge (27:31)
  • Introduction (00:08)
  • BPDU Types (01:10)
  • Electing the Root Bridge (08:06)
  • Root Bridge eNotes (12:20)
  • STP Transition States (05:37)
  • Summary (00:08)
PVST (24:37)
  • Introduction (00:08)
  • PVST (05:47)
  • Demo: Per-VLAN Spanning Tree (05:04)
  • Demo: VTP and Trunking (05:53)
  • Demo: Change Root Bridge (04:55)
  • Influencing the Root Bridge Election (02:40)
  • Summary (00:08)

STP Options

Cost and Priority (24:40)
  • Introduction (00:08)
  • Changing Cost and Priority eNotes (05:26)
  • Manipulate a Path (00:49)
  • Demo: Cost and Priority (04:10)
  • Convergence Time (01:07)
  • RSTP Port States (04:47)
  • Change of Port States (03:30)
  • Running RSTP (03:12)
  • Spanning Tree Security Overview (01:20)
  • Summary (00:08)
UplinkFast (20:59)
  • Introduction (00:08)
  • UplinkFast eNotes (02:01)
  • BackboneFast eNotes (03:39)
  • Configure UplinkFast and BackboneFast (01:03)
  • PortFast and BPDU Guard eNotes (03:15)
  • BPDU Filter (02:13)
  • Root Guard (02:39)
  • Demo: PortFast (05:48)
  • Summary (00:08)
Unidirectional Problems (19:49)
  • Introduction (00:08)
  • Unidirectional Problems eNotes (03:45)
  • Loop Guard (03:06)
  • Hardware Failure (01:20)
  • Flex Links (01:11)
  • Flex Links eNotes (01:03)
  • Multiple Spanning Tree (01:48)
  • MST Design eNotes (04:09)
  • Internal Spanning Trees (00:48)
  • MST and STP (01:05)
  • Summary (01:13)
  • Summary (00:08)

Inter-VLAN Routing

VLAN Routing (28:45)
  • Introduction (00:12)
  • Router on a Stick (07:51)
  • Demo: Build a Network (04:49)
  • Demo: Sub-Interfaces (04:34)
  • Demo: Add a Host (05:38)
  • Demo: Router on a Stick (05:31)
  • Summary (00:08)
External Routing (13:01)
  • Introduction (00:08)
  • Pros and Cons of an External Router (01:34)
  • Using an MLS (03:41)
  • SVI eNotes (05:49)
  • Layer 2 to Layer 3 (01:39)
  • Summary (00:08)
Switch Virtual Interface (27:50)
  • Introduction (00:08)
  • Demo: Build a Network (05:36)
  • Demo: Add Addresses (03:53)
  • Demo: Create VLAN Interfaces (05:47)
  • Demo: SVI Routing (04:37)
  • L3 Switch Interface eNotes (04:03)
  • Requirements for an SVI (01:36)
  • EtherChannel on L3 (01:58)
  • Summary (00:08)

NTP and SNMP

Set Switch Time (26:24)
  • Introduction (00:12)
  • Time Setting (01:45)
  • Demo: Manually Set Time (02:35)
  • NTP (01:06)
  • NTP Continued (02:12)
  • NTP Modes (02:37)
  • Example Setup eNotes (01:29)
  • Demo: NTP Settings (07:22)
  • Hierarchy Options of NTP (01:42)
  • Demo: Secure NTP (05:10)
  • Summary (00:08)
NTP and SNMP (33:51)
  • Introduction (00:08)
  • NTP Versions (02:39)
  • SNTP (02:22)
  • Overview of SNMP (06:06)
  • Versions of SNMP (05:14)
  • SNMP Best Practices (04:00)
  • Steps to Configure SNMPv3 (03:08)
  • Demo: SNMP (03:07)
  • Demo: SNMP Groups (06:54)
  • Summary (00:08)

SLA, SPAN, and StackWise

SLA (21:46)
  • Introduction (00:08)
  • IP SLA (01:31)
  • Get IOS IP SLA Diagram eNotes (04:02)
  • IP SLA Source/Responder (01:02)
  • SLA eNotes (06:45)
  • Demo: IP SLA (04:08)
  • Demo: Run IP SLA Test (03:59)
  • Summary (00:08)
SLA Responders (19:59)
  • Introduction (00:08)
  • SLA Operation with Responder eNotes (05:14)
  • Responder Time Stamps (02:17)
  • Demo: SLA Responder (07:40)
  • SPAN (01:04)
  • Terminology (01:33)
  • Remote SPAN (01:05)
  • Simple Steps to Configure SPAN (00:47)
  • Summary (00:08)
StackWise (14:05)
  • Introduction (00:08)
  • RSPAN (01:13)
  • StackWise (02:22)
  • StackWise eNotes (02:40)
  • Benefits of StackWise (00:41)
  • Switch Supervisors (02:08)
  • Supervisor Redundancy Modes (02:46)
  • VSS (01:56)
  • Summary (00:08)

Redundancy

FHRP and HSRP (32:42)
  • Introduction (00:12)
  • The Need for FHRP eNotes (02:12)
  • Example of FHRP eNotes (02:13)
  • HSRP Toplogy eNotes (02:57)
  • Configuration of HSRP eNotes (07:43)
  • Demo: HSRP (06:24)
  • Demo: Set up Router 2 (04:29)
  • Demo: Pre-empt (06:20)
  • Summary (00:08)
HSRP Continued (24:28)
  • Introduction (00:08)
  • What Is HSRP Pre-empt (03:50)
  • HSRP Transition Steps (01:46)
  • HSRP State Transitions (01:40)
  • STP and HSRP (01:18)
  • Can You Load Share (02:12)
  • Interface Tracking (04:23)
  • Tracking Objects eNotes (02:22)
  • Demo: HSRP Failover and Tracking (05:12)
  • Object Tracking Goals (01:24)
  • Summary (00:08)
Timers and VRRP (28:00)
  • Introduction (00:08)
  • HSRP Timers (02:09)
  • HSRP Versions (02:16)
  • VRRP (01:35)
  • VRRP eNotes (01:44)
  • Demo: Configure VRRP (04:18)
  • Demo: Using VRRP (04:08)
  • Minor Changes (00:40)
  • VRRP Authentication and Tracking (01:31)
  • Summary (01:34)
  • GLBP (02:12)
  • GLBP Election (00:31)
  • Overview of GLBP eNotes (04:36)
  • Summary (00:22)
  • Summary (00:08)

Security

Security Best Practices (21:13)
  • Introduction (00:12)
  • OSI Layers Security (01:39)
  • Layer 2 Security (02:39)
  • Best Practices (09:50)
  • Best Practices Continued (02:30)
  • Rogue Devices (02:23)
  • Layer 2 Attacks (01:48)
  • Summary (00:08)
Port Security (32:45)
  • Introduction (00:08)
  • MAC Flooding eNotes (02:22)
  • Port Security eNotes (01:54)
  • Demo: Create Network (05:41)
  • Demo: Port Security (05:21)
  • Port Errors (03:00)
  • Port-Based ACL (02:09)
  • Storm Control (02:56)
  • Demo: Storm Control (02:18)
  • AAA Framework (02:06)
  • Authentication (03:02)
  • RADIUS and TACACS (01:35)
  • Summary (00:08)
RADIUS and TACACS (22:16)
  • Introduction (00:08)
  • RADIUS and TACACS+ (03:27)
  • RADIUS and TACACS+ eNotes (02:57)
  • Demo: AAA Configuration Options (04:36)
  • Demo: AAA Groups (03:42)
  • Limitations (01:19)
  • Physical Security (01:26)
  • 802.1x (00:59)
  • 802.1x eNotes (01:40)
  • 802.1x Configuration (01:49)
  • Summary (00:08)
DHCP Spoofing (23:39)
  • Introduction (00:08)
  • DHCP Spoofing Attacks eNotes (03:12)
  • Cisco DHCP Spoofing eNotes (01:42)
  • IP Source Guard (01:33)
  • ARP Spoofing eNotes (03:43)
  • DAI (01:20)
  • Dynamic Trunking Protocol (01:02)
  • VLAN Hopping (02:59)
  • VACLs (01:35)
  • Why PVLANs eNotes (04:47)
  • Isolated Ports (00:51)
  • Protected Ports (00:34)
  • Summary (00:08)