|
|
1 | (4) |
|
Lab 1-1: Lab Configuration Guide |
|
|
1 | (4) |
|
|
2 | (1) |
|
|
3 | (2) |
|
|
5 | (26) |
|
Lab 2-0a: Clearing an Isolated Switch (2.6.1) |
|
|
5 | (5) |
|
|
5 | (1) |
|
|
5 | (1) |
|
Step 3 Erasing the startup-config File |
|
|
6 | (1) |
|
|
6 | (3) |
|
Step 5 Ready for Configuration |
|
|
9 | (1) |
|
Lab 2-0b: Clearing a Switch Connected to a Larger Network (2.6.1) |
|
|
10 | (4) |
|
Step 1 Clearing an Isolated Switch |
|
|
10 | (1) |
|
|
10 | (1) |
|
Step 3 Erasing the startup-config File |
|
|
10 | (1) |
|
Step 4 Relearning VLANs from a Server |
|
|
11 | (1) |
|
Step 5 Eliminating Relearned VLANs |
|
|
12 | (1) |
|
Step 6 VTP Mode Transparent |
|
|
13 | (1) |
|
Lab 2-1: Catalyst 2960 and 3560 Series Static VLANs, VLAN Trunking, and VTP Domain and Modes (2.6.2) |
|
|
14 | (17) |
|
Scenario: VLAN Trunking and Domains |
|
|
14 | (1) |
|
Step 1 Preparing the Switch |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (2) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Step 6 Dynamic Auto Trunking |
|
|
19 | (2) |
|
Step 7 show interface Commands |
|
|
21 | (2) |
|
Step 8 Switchport Mode Commands |
|
|
23 | (2) |
|
|
25 | (1) |
|
|
26 | (2) |
|
Step 11 Switchport Access VLAN |
|
|
28 | (1) |
|
|
29 | (1) |
|
Step 13 Preparation for the Next Lab |
|
|
30 | (1) |
|
Implementing Spanning Tree |
|
|
31 | (48) |
|
Lab 3-1: Spanning Tree Protocol (STP) Default Behavior (3.5.1) |
|
|
31 | (6) |
|
Scenario: How Spanning Tree Prevents Loops |
|
|
31 | (1) |
|
Step 1 Basic Configurations |
|
|
31 | (1) |
|
|
32 | (1) |
|
Step 3 show spanning tree |
|
|
32 | (4) |
|
Step 4 Diagraming Spanning Tree |
|
|
36 | (1) |
|
Challenge: A New Root for Spanning Tree |
|
|
36 | (1) |
|
Lab 3-2: Modifying Default Spanning Tree Behavior (3.5.2) |
|
|
37 | (12) |
|
Scenario: Logically Removing Bridging Loops |
|
|
37 | (1) |
|
|
37 | (1) |
|
Step 2 Verifying the Root Bridge |
|
|
37 | (3) |
|
Step 3 Changing the Primary and Secondary Root |
|
|
40 | (2) |
|
Step 4 Changing Forwarding and Blocking Ports |
|
|
42 | (2) |
|
|
44 | (2) |
|
Step 6 Modifying Port Costs |
|
|
46 | (3) |
|
Lab 3-3: Per-VLAN Spanning Tree Behavior (3.5.3) |
|
|
49 | (13) |
|
Scenario: Configuring Spanning Tree Differently for Different VLANs |
|
|
49 | (1) |
|
|
49 | (1) |
|
Step 2 Setting up VTP Domains |
|
|
49 | (3) |
|
Step 3 Modifying Spanning Tree on a per-VLAN Basis |
|
|
52 | (6) |
|
|
58 | (2) |
|
Challenge: Spanning Tree Root Primary |
|
|
60 | (2) |
|
Lab 3-4: Multiple Spanning Tree (3.5.4) |
|
|
62 | (10) |
|
Scenario: Configuring Multiple Spanning Tree |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
Step 3 Verifying 11 Instances of Spanning Tree |
|
|
63 | (3) |
|
Step 4 spanning-tree mode mst |
|
|
66 | (1) |
|
Step 5 Grouping VLANs Using MST |
|
|
67 | (3) |
|
Challenge: Modifying per-instance MST Attributes |
|
|
70 | (2) |
|
Lab 3-5: Configuring EtherChannel (3.5.5) |
|
|
72 | (7) |
|
Scenario: Bundling Redundant Links into One Logical Link |
|
|
72 | (1) |
|
|
72 | (1) |
|
Step 2 channel group mode desirable |
|
|
72 | (3) |
|
Step 3 channel group mode active |
|
|
75 | (1) |
|
Step 4 Configuring EtherChannel on Layer 3 Connections |
|
|
75 | (1) |
|
Step 5 Traffic Load Balancing |
|
|
76 | (1) |
|
Challenge: Logically Aggregating Additional Redundant Links |
|
|
77 | (2) |
|
Implementing Inter-VLAN Routing |
|
|
79 | (20) |
|
Lab 4-1: Inter-VLAN Routing with an External Router (4.4.1) |
|
|
79 | (8) |
|
Scenario: A Cost Effective Solution to Segment a Network into Multiple Broadcast Domains |
|
|
79 | (1) |
|
|
79 | (1) |
|
Step 2 Configuring up the Gateway and ISP Router |
|
|
79 | (1) |
|
Step 3 ip default-gateway |
|
|
80 | (1) |
|
Step 4 Verify Existing VLANs |
|
|
81 | (1) |
|
Step 5 Configuring Trunking and EtherChannel |
|
|
82 | (1) |
|
Step 6 Configuring the VTP Domain |
|
|
83 | (1) |
|
Step 7 Configuring Switch Access Ports for Hosts |
|
|
83 | (1) |
|
Step 8 Trunking with the External Router |
|
|
83 | (1) |
|
Step 9 Trunking for VLANs 1, 100, and 200 |
|
|
84 | (2) |
|
Step 10 Verify inter-VLAN Routing |
|
|
86 | (1) |
|
Lab 4-2: Inter-VLAN Routing with an Internal Route Processor and Monitoring CEF Functions (4.4.2) |
|
|
87 | (12) |
|
Scenario: Configuring Switched Virtual Interfaces to Route Between VLANs |
|
|
87 | (1) |
|
|
87 | (1) |
|
Step 2 Basic Configuration |
|
|
87 | (2) |
|
Step 3 Configuring Trunks and EtherChannel |
|
|
89 | (2) |
|
Step 4 Changing the VTP Mode |
|
|
91 | (1) |
|
Step 5 Creating the VTP Domain |
|
|
92 | (1) |
|
Step 6 Configuring the Host Ports |
|
|
92 | (1) |
|
Step 7 Creating Layer 3 VLAN interfaces |
|
|
93 | (1) |
|
Step 8 Verifying inter-VLAN Routing |
|
|
94 | (1) |
|
|
94 | (5) |
|
Implementing High Availability in a Campus Environment |
|
|
99 | (26) |
|
Lab 5-1: Hot Standby Router Protocol (5.4.1) |
|
|
99 | (14) |
|
Scenario: Redundant, Fault-tolerant Routing to the Internal Network |
|
|
99 | (1) |
|
|
99 | (1) |
|
Step 2 Basic Configuration |
|
|
99 | (2) |
|
Step 3 Configuring Trunks and EtherChannel |
|
|
101 | (3) |
|
Step 4 Changing the VTP Mode |
|
|
104 | (1) |
|
Step 5 Creating the VTP Domain |
|
|
105 | (1) |
|
Step 6 Configuring the Host Ports |
|
|
105 | (1) |
|
Step 7 HSRP Configuration |
|
|
106 | (2) |
|
|
108 | (4) |
|
Step 9 Verify Connectivity Between VLANs |
|
|
112 | (1) |
|
|
112 | (1) |
|
Lab 5-2: HSRP Troubleshooting (5.4.2) |
|
|
113 | (1) |
|
|
113 | (1) |
|
Lab 5-3: Gateway Load Balancing Protocol |
|
|
114 | (11) |
|
|
114 | (1) |
|
Step 2 Basic Configuration |
|
|
114 | (1) |
|
Step 3 GLBP Configuration and Verification |
|
|
114 | (6) |
|
Step 4 Adjusting the Weight to Prefer Certain Routers |
|
|
120 | (5) |
|
|
125 | (44) |
|
Option 1: Using the External WLAN Controller |
|
|
125 | (2) |
|
Option 2: Using the WLAN Controller Network Module |
|
|
127 | (2) |
|
Lab 6-1a: Configuring an External WLAN Controller (6.7.1a) |
|
|
129 | (10) |
|
|
130 | (1) |
|
Step 2 Basic Configuration |
|
|
130 | (2) |
|
Step 3 Configuring the Switched Virtual Interfaces |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
Step 6 Configuring the Host and Host Port |
|
|
134 | (2) |
|
Step 7 Enable and Verify Routing |
|
|
136 | (1) |
|
Step 8 WLAN Controller Wizard |
|
|
136 | (2) |
|
Step 9 Additional WLAN Controller Configuration |
|
|
138 | (1) |
|
Lab 6-1b: Configuring a WLAN Controller Installed in a Router (6.7.1b) |
|
|
139 | (10) |
|
|
139 | (1) |
|
Step 2 VLAN and VTP Domain Configuration |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
Step 6 Configuring the Host and Host Port |
|
|
142 | (2) |
|
|
144 | (1) |
|
Step 8 WLAN Controller Wizard |
|
|
145 | (2) |
|
Step 9 Additional WLAN Controller Configuration |
|
|
147 | (2) |
|
Lab 6-2: Configuring a WLAN Controller via the Web Interface (6.7.2) |
|
|
149 | (9) |
|
Step 1 Load Existing Configurations from Previous Lab |
|
|
150 | (1) |
|
Step 2 Using the Web Interface for Configuration |
|
|
150 | (2) |
|
Step 3 Creating Logical Interfaces |
|
|
152 | (3) |
|
Step 4 Configuring WLANs That Correspond to the VLANs |
|
|
155 | (3) |
|
Lab 6-3: Configuring a Wireless Client (6.7.3) |
|
|
158 | (11) |
|
Step 1 Install Cisco Aironet Wireless Card Software |
|
|
159 | (4) |
|
Step 2 Inserting the Cisco 802.11 a/b/g Wireless Adapter |
|
|
163 | (3) |
|
Step 3 Verify Status of Installation |
|
|
166 | (3) |
|
Configuring Campus Switches to Support Voice |
|
|
169 | (12) |
|
Lab 7-1: Configuring Switches for IP Telephony Support (7.3.1) |
|
|
169 | (12) |
|
Scenario: Preparing the Switching Network to Support Voice |
|
|
169 | (1) |
|
|
170 | (1) |
|
Step 2 Basic Configuration |
|
|
170 | (1) |
|
Step 3 Configure the Trunks and EtherChannel |
|
|
171 | (2) |
|
Step 4 Changing the VTP Mode |
|
|
173 | (1) |
|
Step 5 Creating the VTP Domain |
|
|
174 | (1) |
|
|
174 | (2) |
|
Step 7 Auto QoS Configuration |
|
|
176 | (1) |
|
|
177 | (1) |
|
Step 9 Configure the Distribution Layer to Trust CoS |
|
|
177 | (1) |
|
Step 10 Verify Auto QoS at the Distribution Layer |
|
|
178 | (1) |
|
|
179 | (2) |
|
Minimizing Service Loss and Data Theft in a Campus Network |
|
|
181 | (32) |
|
Lab 8-1: Securing the Layer 2 Switching Devices (8.7.1) |
|
|
181 | (12) |
|
Scenario: Layer 2 Threats |
|
|
181 | (1) |
|
|
182 | (1) |
|
Step 2 Basic Configuration |
|
|
182 | (2) |
|
Step 3 Configuring VLANs and VTP |
|
|
184 | (2) |
|
Step 4 Layer 2 Attacks and Mitigation |
|
|
186 | (1) |
|
Step 5 Protecting Against MAC Flooding |
|
|
187 | (1) |
|
|
188 | (3) |
|
|
191 | (2) |
|
Lab 8-2: Securing Spanning Tree Protocol (8.7.2) |
|
|
193 | (11) |
|
Scenario: Protecting the Root Bridge and Preventing Rogue Access Points |
|
|
193 | (1) |
|
Step 1 Verify Configurations from Lab 8-1 |
|
|
193 | (4) |
|
Step 2 Locking Down the Spanning Tree Root |
|
|
197 | (2) |
|
Step 3 spanning-tree guard root |
|
|
199 | (1) |
|
|
199 | (2) |
|
|
201 | (1) |
|
|
202 | (2) |
|
Lab 8-3: Securing VLANs with Private VLANs, RACLs, and VACLs (8.7.3) |
|
|
204 | (9) |
|
Scenario: Configuring the Network to Secure VLANs |
|
|
204 | (1) |
|
Step 1 Verifying Loaded Configurations |
|
|
204 | (3) |
|
|
207 | (3) |
|
|
210 | (1) |
|
|
211 | (2) |
|
|
213 | |
|
Case Study 1: VLANs, VTP, and Inter-VLAN Routing |
|
|
213 | (2) |
|
Case Study 2: Voice and Security in a Switched Network |
|
|
215 | |