Browse Library

Implementing Cisco IP Switched Networks v2.0 - SWITCH (Professional)

Implementing Cisco IP Switched Networks (SWITCH) v2.0 is a Professional-level self-study technical course in the curriculum for the CCNP Route & Switch certification. This is an advanced course on Cis

4.8 24685 views Duration :6 Days 36 hrs Level : Intemediate
Last Updated: 2022-07-28 05:07:00 English Delivery Format: Live Training
Live Training
$1,200 per participant
Next Batch Starting on:

Aug 22 - Aug 26

5:30 pm to 7:30 pm EST

6 days left at this price!
OR

It Includes

  • 6 Days training program
  • Live Virtual Training
  • Learn on any PC/Mobile/Tablet
  • Unlimited Doubt Sessions
  • Online Labs (if applicable)
  • Official Courseware & Kits
  • Get Recording after session
  • Get Certificate of Completion
  • Mock Tests & Exam Preps

What you'll learn?

    • Describe the hierarchical campus structure, basic switch operation, use of SDM templates, PoE, and LLDP
    • Implement VLANs and trunks, explain VTP, implement DHCP in IPv4 and IPv6 environments, and configure port aggregation Implement and optimize the STP mechanism that best suits your network: PVST+, Rapid PVST+, or MST 4. Configure routing on a multilayer switch
    • Configure NTP, SNMP, IP SLA, and port mirroring, and verify StackWise and VSS operation
    • Implement first-hop redundancy in IPv4 and IPv6 environments
    • Secure the campus network according to recommended practices

Course Overview

COURSE OBJECTIVE

SWITCH v2.0, course, includes major updates and follows an updated blueprint. (However, note that this course does not cover all items listed on the blueprint.) Some older topics have been removed or simplified, while several new IPv6 routing topics have been added. The course content has been adapted to Cisco IOS Software Release 15 and technically updated.
The goal of the course is to build upon the knowledge and skills from CCNA Routing and Switching and help you expand competencies to plan, implement, and monitor a scalable routing network.

Who Should Attend?

Learners who aim to be network professionals and who have knowledge that is obtained from Cisco CCNA courses

Pre-requisites

    • Required: Configuring devices for SNMP, Syslog, and NetFlow access Managing Cisco device configurations, Cisco IOS images, and licenses
    • Required: Describing network fundamentals and manage network device security
    • Required: Establishing Internet/WAN connectivity, troubleshooting IP connectivity, configuring/ troubleshooting EIGRP and OSPF (IPv4 and IPv6)
    • Required: Operating a medium-sized LAN with multiple switches, supporting VLANs, trunking, and spanning tree
    • Recommended: Interconnecting Cisco Networking Devices, Part 1 v 3.0 - ICND1 (Entry)
    • Recommended: Interconnecting Cisco Networking Devices, Part 2 v3.0 - ICND2 (Associate)
    • Recommended: Routing & Switching (ICND1 and ICND2) v3.0 Prep Boot Camp - CCNAX (Associate)

Course Outline

  • Basic Concepts and Network Design

    • Analyzing Campus Network Structure
    • Hierarchical Network Design
    • Layers in the Hierarchical Model
    • Building Cisco Enterprise Campus Architecture
    • Access Layer
    • Distribution Layer
    • Core Layer
    • Is a Core Layer Needed?
    • Types of Cisco Switches
    • Routed vs. Switched Campus Architecture
    • Comparing Layer 2 and Multilayer Switches
    • Layer 2 Switch Operation
    • Multilayer Switch Operation
    • Frame Rewrite
    • CAM and TCAM
    • Distributed Hardware Forwarding
    • Cisco Switching Methods
    • Route Caching
    • Topology-Based Switching
    • Using Cisco SDM Templates
    • What Are SDM Templates?
    • SDM Template Types
    • Changing the SDM Template
    • Choosing the Correct Template
    • Implementing LLDP
    • LLDP Introduction
    • Enabling LLDP
    • Discovering Neighbors Using LLDP
    • Implementing PoE
    • The Need for PoE
    • PoE Components
    • PoE Standards
    • PoE Negotiation
    • Configuring and Verifying PoE

  • Campus Network Architecture

    • Implementing VLANs and Trunks
    • The Native VLAN
    • Switch Port Mode Interactions
    • Deploying VLANs
    • End-to-End vs. Local VLANs
    • Voice VLAN Overview
    • Voice VLAN Configuration
    • Switch Configuration for Wireless Network Support
    • Introducing VTP
    • The Role of VTP
    • VTP Modes
    • VTP Versions
    • Default VTP Configuration
    • Overwriting VTP Configuration
    • VTP Configuration Recommendation
    • Implementing DHCP
    • DHCP Overview
    • DHCP Relay
    • DHCP Options
    • Implementing DHCP for IPv6
    • Stateless Autoconfiguration Overview
    • DHCPv6 Overview
    • DHCPv6 Operation
    • Stateless DHCPv6 Overview
    • DHCPv6 Relay Agent
    • Configuring Layer 2 Port Aggregation
    • The Need for EtherChannel
    • EtherChannel Mode Interactions
    • Layer 2 EtherChannel Configuration Guidelines
    • EtherChannel Load-Balancing Options
    • EtherChannel Load-Balancing Operation
    • EtherChannel Guard

  • Spanning Tree Implementation

    • Implementing RSTP
    • STP Overview
    • STP Standards
    • STP Operation
    • Bridge Protocol Data Units
    • Root Bridge Election
    • Root Port Election
    • Designated Port Election
    • STP Port States
    • Per VLAN Spanning Tree
    • RSTP Port Roles
    • Comparison of RSTP and STP Port States
    • STP Topology Changes
    • RSTP Topology Changes
    • RSTP Link Types
    • Implementing STP Stability Mechanisms
    • Cisco STP Toolkit
    • UplinkFast
    • BackboneFast
    • PortFast
    • Securing a PortFast Interface with BPDU guard
    • Disabling STP with BPDU filter
    • The Problem with Unidirectional Links
    • Loop Guard Overview
    • Loop Guard Configuration
    • Loop Guard Verification
    • UDLD Overview
    • UDLD Configuration
    • Comparing Loop Guard with UDLD
    • UDLD Recommended Practices
    • STP Stability Mechanism Recommendations
    • Flex Links
    • Implementing MST
    • Introducing MST
    • MST Regions
    • STP Instances with MST
    • Extended System ID for MST
    • Configuring MST Path Cost
    • Configuring MST Port Priority
    • MST Protocol Migration
    • MST Recommended Practices

  • Inter-VLAN Routing

    • Implementing Inter-VLAN Routing Using a Router
    • Inter-VLAN Routing Using an External Router
    • External Router: Advantages and Disadvantages
    • Configuring a Switch to Route
    • Switch Virtual Interfaces
    • Routed Switch Ports
    • SVI autostate exclude Command
    • SVI Configuration Checklist
    • Layer 2 EtherChannel vs. Layer 3 EtherChannel
    • Layer 3 EtherChannel Configuration

  • High-Availability Networks

    • Configuring Network Time Protocol
    • The Need for Accurate Time
    • Configuring the System Clock Manually
    • Network Time Protocol
    • NTP Modes
    • Securing NTP
    • NTP Source Address
    • NTP Versions
    • NTP in an IPv6 Environment
    • Simple Network Time Protocol
    • SNTP Configuration
    • Implementing SNMP Version 3
    • SNMP Overview
    • SNMP Versions
    • SNMP Recommendations
    • SNMPv3 Configuration
    • Verifying the SNMPv3 Configuration
    • Implementing the Cisco IOS IP SLA
    • Cisco IOS IP SLA Introduction
    • IP SLA Source and Responder
    • IP SLA Operation with Responder
    • IP SLA Responder Time Stamps
    • Configuring Authentication for the IP SLA
    • Configuration Example: UDP Jitter
    • Implementing Port Mirroring for Monitoring Support
    • What Is SPAN?
    • SPAN Terminology
    • Remote SPAN
    • Local SPAN Configuration
    • Verifying the Local SPAN Configuration
    • RSPAN Configuration
    • Verifying the RSPAN Configuration
    • Verifying Switch Virtualization
    • The Need for Logical Switching Architectures
    • What Is StackWise?
    • StackWise Benefits
    • Verifying StackWise
    • Redundant Switch Supervisors
    • Supervisor Redundancy Modes
    • What Is VSS?
    • VSS Benefits
    • Verifying VSS

  • First Hop Redundancy Protocol Implementation

    • Configuring Layer 3 Redundancy with HSRP
    • The Need for First-Hop Redundancy
    • The Idea Behind the First-Hop Redundancy Process
    • HSRP State Transition
    • HSRP and STP
    • Load Sharing with HSRP
    • The Need for Interface Tracking with HSRP
    • HSRP Interface Tracking
    • HSRP and Object Tracking
    • HSRP Authentication
    • HSRP Timers
    • HSRP Versions
    • Configuring Layer 3 Redundancy with VRRP
    • About VRRP
    • Tracking and VRRP
    • VRRP Interface-Tracking Configuration
    • Configuring Layer 3 Redundancy with GLBP
    • Introducing GLBP
    • GLBP vs. HSRP
    • GLBP States
    • GLBP Load-Balancing Options
    • GLBP Authentication
    • GLBP and STP
    • Tracking and GLBP
    • Configuring First Hop Redundancy Protocol for IPv6
    • IPv6 Native First-Hop Redundancy
    • Why FHRP in IPv6?
    • HSRP for IPv6
    • GLBP for IPv6

  • Campus Network Security

    • Implementing Port Security
    • Overview of Switch Security Issues
    • Recommended Practices for Switch Security
    • Unauthorized Access by Rogue Devices
    • Switch Attack Categories
    • MAC Flooding Attack
    • Introducing Port Security
    • Port Error Conditions
    • Error-Disabled Port Automatic Recovery
    • Port Access Lists
    • Configure Port Access Lists
    • Implementing Storm Control
    • Storm Control
    • Configuring Storm Control
    • Verifying Storm Control Behavior
    • Implementing Access to External Authentication
    • AAA Framework Overview
    • Benefits of AAA Usage
    • Authentication Options
    • RADIUS and TACACS+
    • Enabling AAA and Configuring a Local User for Fallback
    • Configuring RADIUS for Console and vty Access
    • Configuring TACACS+ for Console and vty Access
    • Configuring Authorization and Accounting
    • Limitations of TACACS+ and RADIUS
    • Identity-Based Networking
    • IEEE 802.1X Port-Based Authentication
    • IEEE 802.1X Configuration Checklist
    • Mitigating Spoofing Attacks
    • DHCP Spoofing Attacks
    • DHCP Snooping
    • DHCP Snooping Configuration
    • IP Source Guard
    • IP Source Guard Configuration
    • ARP Spoofing
    • Dynamic ARP Inspection
    • DAI Configuration
    • Securing VLAN Trunks
    • Switch Spoofing
    • Protecting Against Switch Spoofing
    • VLAN Hopping
    • Protecting Against VLAN Hopping
    • VLAN Access Lists
    • VACL Interaction with ACL and PACL
    • Configuring VACLs
    • Configuring PVLANs
    • The Need for PVLANs
    • Introduction to PVLANs
    • PVLAN Port Types
    • PVLAN Configuration
    • PVLAN Verification
    • PVLANs Across Multiple Switches
    • Protected Port Feature

FAQs

  • What is the difference both 1-on-1 Public and 1-on-1 Private.?

    In both, you choose the schedule. In public, other participants can join, Private other participants want to join.
  • Is this website Secure?

    Yes, the site is secure by utilizing Secure Sockets Layer (SSL) Technology. SSL technology enables the encryption of sensitive information during online transactions. We use the highest assurance SSL/TLS certificate, which ensures that no unauthorized person can get to your sensitive payment data over the web.
  • Is my information secure?

    We use the best standards in Internet security. Any data retained is not shared with third parties.
  • Once I made my payment online, can I cancel it?

    You can request a refund if you do not wish to enroll in the course.
  • What types of credit cards are accepted?

    We do accept all major credit cards from Visa, Mastercard, American Express, and Discover.
  • Do you offer corporate training?

    Yes, we do offer corporate training
  • Are weekend classes available?

    Yes, we also offer weekend classes.
  • What payment options are available?

    You can pay through debit/credit card or bank wire transfer.
  • Can I request for a demo class before Registering?

    Yes you can request your customer experience manager for the same.
Need Help Finding The Right Training Solution?
Our training advisors are here for you.

More in Tech & IT

$1,200
Sign Up & Start Learning
By signing up, you agree to our Terms of Use and Privacy Policy
Create New Password
Enter your email address and we'll send you a link to reset your password.