Vous êtes sur la page 1sur 187

LAN Design

LAN Switching and Wireless – Chapter 1

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Describe how a hierarchical network supports the
voice, video and data needs of a small and medium-
sized business.
ƒ Match the appropriate Cisco switch to each layer in
the hierarchical network design model.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Describe how a Hierarchical Network Supports
the Needs of a Small & Medium-Sized Business
ƒ Describe the key principles of hierarchical network
design

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Describe how a Hierarchical Network Supports
the Needs of a Small & Medium-Sized Business

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Describe how a Hierarchical Network Supports
the Needs of a Small & Medium-Sized Business

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Describe how a Hierarchical Network Supports
the Needs of a Small & Medium-Sized Business
ƒ Describe the role of a converged network in supporting
small and medium-sized (SMB) business voice, video,
and data needs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Match the Appropriate Cisco Switch to each
Layer in the Hierarchical Network Design Model
ƒ Identify the considerations used to select a switch for a
hierarchical network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Match the Appropriate Cisco Switch to each
Layer in the Hierarchical Network Design Model
ƒ Identify the key features of switches that are used in
hierarchical networks

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Match the Appropriate Cisco Switch to each
Layer in the Hierarchical Network Design Model
ƒ Identify the key features of switches that are used in
hierarchical networks

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Match the Appropriate Cisco Switch to each
Layer in the Hierarchical Network Design Model
ƒ Identify the switch features found in each level in a
hierarchical network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Match the Appropriate Cisco Switch to each
Layer in the Hierarchical Network Design Model

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Summary
ƒ Hierarchical Design model addresses performance,
scalability, maintainability & manageability issues.
ƒ Traffic Analysis is used to monitor network
performance.
ƒ Hierarchical Design Model is composed of 3 layers:
Access
Distribution
Core

ƒ Switches selected for each layer must meet the needs


of each hierarchical layer as well as the needs of the
business.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Configure a Switch

LAN Switching and Wireless – Chapter 2

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Summarize the operation of Ethernet as defined for
100/1000 Mbps LANs in the IEEE 802.3 standard.
ƒ Explain the functions that enable a switch to forward
Ethernet frames in a LAN.
ƒ Configure a switch for operation in a network
designed to support voice, video, and data
transmissions.
ƒ Configure basic security on a switch that will operate
in a network designed to support voice, video, and
data transmissions.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Summarize the operation of Ethernet as
defined for 100/1000 Mbps LANs in the IEEE
802.3 standard
ƒ Describe the key elements of Ethernet/802.3 networks:
CSMA/CD, half-, full-duplex, collisions
ƒ Ethernet frame, MAC address

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Summarize the operation of Ethernet as
defined for 100/1000 Mbps LANs in the IEEE
802.3 standard
ƒ Describe the design considerations for Ethernet/802.3
networks

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Summarize the operation of Ethernet as
defined for 100/1000 Mbps LANs in the IEEE
802.3 standard

ƒ Describe the LAN design considerations to reduce network latency

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Explain the Functions that Enable a Switch to
Forward Ethernet Frames in a LAN
ƒ Describe the switch forwarding methods: store-and-
forawd & cut-through (fast-forward, fragment-free)

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Explain the Functions that Enable a Switch to
Forward Ethernet Frames in a LAN
ƒ Explain symmetric and asymmetric Switching

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Explain the Functions that Enable a Switch to
Forward Ethernet Frames in a LAN
ƒ Describe how memory buffering works

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Explain the Functions that Enable a Switch to
Forward Ethernet Frames in a LAN
ƒ Compare Layer 2 with Layer 3 switching

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Configure a Switch for Operation in a Network
ƒ Describe the Cisco IOS commands used to navigate
the command-line

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Configure a Switch for Operation in a Network

ƒ Describe the Cisco IOS help facilities

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Configure a Switch for Operation in a Network
ƒ Describe the Cisco IOS commands used to access the
command history

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Configure a Switch for Operation in a Network
ƒ Describe the boot sequence of a Cisco switch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Configure a Switch for Operation in a Network
ƒ Describe how to prepare the switch to be configured

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Configure a Switch for Operation in a Network
ƒ Describe how to perform a basic switch configuration

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Configure a Switch for Operation in a Network

ƒ Describe how to perform a basic switch configuration

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Configure a Switch for Operation in a Network
ƒ Describe how to verify the Cisco IOS configuration
using the Show command

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Configure a Switch for Operation in a Network
ƒ Describe how to manage the Cisco IOS configuration
files

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Configure Basic Security on a Switch
ƒ Describe the Cisco IOS commands used to configure
password options

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Configure Basic Security on a Switch
ƒ Describe the Cisco IOS commands used to configure a
login banner

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Configure Basic Security on a Switch
ƒ Describe the how to configure Telnet and SSH on a
switch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Configure Basic Security on a Switch
ƒ Describe the key switch security attacks: MAC address
flooding, spoofing attacks, CDP attacks, and Telnet
attacks

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Configure Basic Security on a Switch
ƒ Describe the key switch security attacks: MAC address flooding,
spoofing attacks, CDP attacks, and Telnet attacks

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Configure Basic Security on a Switch
ƒ Describe how network security tools are used to
improve network security

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Configure Basic Security on a Switch
ƒ Describe why you need to secure ports on a switch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Configure Basic Security on a Switch
ƒ Describe the Cisco IOS commands used to disable
unused ports

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Configure Basic Security on a Switch
ƒ Secure MAC Address Types

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Configure Basic Security on a Switch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
Configure Basic Security on a Switch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
Summary
ƒ LAN Design
Process that explains how a LAN is to be
implemented
Factors to consider in LAN design include
Collision domains
Broadcast domains
Network latency
LAN segmentation

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30
Summary

ƒ Switch forwarding methods


Store & forward – used by Cisco Catalyst switches
Cut through – 2 types
Cut through
Fast forwarding

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 31
Summary

ƒ Symmetric switching
Switching is conducted between ports that have the
same bandwidth
ƒ Asymmetric switching
Switching is conducted between ports that have
unlike bandwidth

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 32
Summary

ƒ CISCO IOS CLI includes the following features


Built in help
Command history/options
ƒ Switch security
Password protection
Use of SSH for remote access
Port security

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 33
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 34
VLANs

LAN Switching and Wireless – Chapter 3

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Explain the role of VLANs in a converged network.
ƒ Explain the role of trunking VLANs in a converged
network.
ƒ Configure VLANs on the switches in a converged
network topology.
ƒ Troubleshoot the common software or hardware
misconfigurations associated with VLANs on switches
in a converged network topology.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Explain the Role of VLANs in a
Converged Network
ƒ Explain the role of VLANs in a converged network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Explain the Role of VLANs in a
Converged Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Explain the Role of VLANs in a
Converged Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Explain the Role of VLANs in a
Converged Network
ƒ Benefits of VLANs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Explain the Role of VLANs in a
Converged Network
ƒ VLAN characteristics

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Explain the Role of VLANs in a
Converged Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Explain the Role of VLANs in a
Converged Network
ƒ Describe the VLAN port membership modes

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Explain the Role of VLANs in a
Converged Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Explain the Role of VLANs in a
Converged Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Explain the Role of VLANs in a
Converged Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Explain the Role of Trunking VLANs in a
Converged Network
ƒ Explain the role of a trunk when using multiple VLANs
in a converged network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Explain the Role of Trunking VLANs in a
Converged Network – 802.1Q tagging

The tag control information field contains:


ƒ 3 bits of user priority - Used by the 802.1p
standard, which specifies how to provide
expedited transmission of Layer 2 frames. A
description of the IEEE 802.1p is beyond the
scope of this course; however, you learned a
little about it earlier in the discussion on voice
VLANs.
ƒ 1 bit of Canonical Format Identifier (CFI) -
Enables Token Ring frames to be carried
across Ethernet links easily.
ƒ 12 bits of VLAN ID (VID) - VLAN identification
numbers; supports up to 4096 VLAN IDs.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Explain the Role of VLANs in a
Converged Network
ƒ Describe how to manage broadcast domains with
VLANs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Explain the Role of Trunking VLANs in a
Converged Network
ƒ Describe how a trunk works

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Explain the Role of Trunking VLANs in a
Converged Network
ƒ Dynamic Trunking Protocol (DTP)

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Explain the Role of Trunking VLANs in a
Converged Network
ƒ Dynamic Trunking Protocol (DTP)

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Configure VLANs on the Switches in a
Converged Network Topology
ƒ Describe the steps to configure trunks and VLANs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Configure VLANs on the Switches in a
Converged Network Topology
ƒ Describe the Cisco IOS commands used to create a
VLAN on a Cisco Catalyst switch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Configure VLANs on the Switches in a
Converged Network Topology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Configure VLANs on the Switches in a
Converged Network Topology
ƒ Describe the Cisco IOS commands used to manage
VLANs on a Cisco Catalyst switch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Configure VLANs on the Switches in a
Converged Network Topology
ƒ Describe the Cisco IOS commands used to create a
trunk on a Cisco Catalyst switch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Configure VLANs on the Switches in a
Converged Network Topology
ƒ Describe the Cisco IOS commands used to create a
trunk on a Cisco Catalyst switch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Troubleshoot Common Software or Hardware
Misconfigurations Associated with VLANs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Troubleshoot Common Software or Hardware
Misconfigurations Associated with VLANs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Troubleshoot Common Software or Hardware
Misconfigurations Associated with VLANs
ƒ Describe how to use the troubleshooting procedure to
fix a common problem with VLAN configurations

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Troubleshoot Common Software or Hardware
Misconfigurations Associated with VLANs
ƒ IP subnet mismatch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
Summary
ƒ VLANS
Allows an administrator to logically group devices
that act as their own network
Are used to segment broadcast domains
Some benefits of VLANs include
Cost reduction, security, higher performance,
better management

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
Summary

ƒ Types of Traffic on a VLAN include


Data
Voice
Network protocol
Network management

ƒ Communication between different VLANs requires the


use of
Routers

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30
Summary

ƒ Trunks
A common conduit used by multiple VLANS for
intra-VLAN communication
ƒ EEE 802.1Q
The standard trunking protocol
Uses frame tagging to identify the VLAN to which a
frame belongs
Does not tag native VLAN traffic

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 31
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 32
Implement VTP

LAN Switching and Wireless – Chapter 4

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Explain the role of VTP in a converged switched
network
ƒ Describe the operation of VTP: VTP domains, VTP
Modes, VTP Advertisements, and VTP Pruning.
ƒ Configure VTP on the switches in a converged
network.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Explain the Role of VTP in a Converged
Switched Network
ƒ Explain the role of VTP in a multi-switch network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Explain the Role of VTP in a Converged
Switched Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Explain the Role of VTP in a Converged
Switched Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Explain the Role of VTP in a Converged
Switched Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Describe the Operation of VTP

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Describe the Operation of VTP
ƒ Explain the role of domains in VTP

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Describe the Operation of VTP

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Describe the Operation of VTP
ƒ Describe how VTP exchanges domain and VLAN
information between switches in the same VTP domain

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Describe the Operation of VTP
ƒ Describe how VTP exchanges domain and VLAN
information between switches in the same VTP domain

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Describe the Operation of VTP
ƒ Describe how VTP exchanges domain and VLAN
information between switches in the same VTP domain

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Describe the Operation of VTP
ƒ VTP revision number

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Describe the Operation of VTP
ƒ Describe the role VTP modes play in enabling VTP to
distribute and synchronize domain and VLAN
configuration information in a network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Describe the Operation of VTP
ƒ Describe the role VTP modes play in enabling VTP to
distribute and synchronize domain and VLAN
configuration information in a network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Describe the Operation of VTP
ƒ Explain how VTP pruning functions

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Configure VTP on the Switches in a
Converged Network
ƒ Configure VTP on a Cisco Catalyst Switch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Configure VTP on the Switches in a
Converged Network
ƒ Configure VTP domain on server & client

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Configure VTP on the Switches in a
Converged Network
ƒ Configure VTP mode

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Configure VTP on the Switches in a
Converged Network
ƒ Manage VLANs on a VTP enabled network (Server)

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Configure VTP on the Switches in a
Converged Network
ƒ Assign ports to VLANs on VTP Clients

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Configure VTP on the Switches in a
Converged Network
ƒ Identify and troubleshoot common VTP configuration
problems

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Configure VTP on the Switches in a
Converged Network
ƒ Identify and troubleshoot common VTP configuration
problems

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Configure VTP on the Switches in a
Converged Network
ƒ Identify and troubleshoot common VTP configuration
problems

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Summary
ƒ VTP is a Cisco proprietary protocol used to exchange
VLAN information across trunk links.
ƒ A switch can be in one of 3 VTP operating modes
Client
Cannot create, modify or delete VLAN
Server
Can create, modify & delete VLAN
Transparent
Can create, modify, & delete LOCAL VLAN
Forwards VTP advertisements.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Summary

ƒ VTP pruning
Limits unnecessary dissemination of VLAN information.

ƒ Verify VTP configuration


Show VTP status
Show interfaces trunk

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Implement Spanning
Tree Protocols

LAN Switching and Wireless – Chapter 5

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Explain the role of redundancy in a converged
network
ƒ Summarize how STP works to eliminate Layer 2 loops
in a converged network
ƒ Explain how the STP algorithm uses three steps to
converge on a loop-free topology
ƒ Implement rapid per VLAN spanning tree (rapid
PVST+) in a LAN to prevent loops between redundant
switches.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Explain the Role of Redundancy in a
Converged Switched Network
ƒ Redundancy in a hierarchical network – which path?

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Explain the Role of Redundancy in a
Converged Switched Network
ƒ Redundancy in a hierarchical network – path failure

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Explain the Role of Redundancy in a
Converged Switched Network
ƒ Redundancy can disable a hierarchical network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Layer 2 loops may occur

broadcast

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Layer 2 loops may occur

CAM change

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Broadcast Storms

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Spanning Tree Topology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Summarize How STP works to Eliminate
Layer 2 Loops in a Converged Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Summarize How STP works to Eliminate
Layer 2 Loops in a Converged Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Summarize How STP works to Eliminate
Layer 2 Loops in a Converged Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Summarize How STP works to Eliminate
Layer 2 Loops in a Converged Network

24576 or x4096
below lowest BID

28672

Default priority:
32768
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Summarize How STP works to Eliminate
Layer 2 Loops in a Converged Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Summarize How STP works to Eliminate
Layer 2 Loops in a Converged Network
ƒ Explain the role of the BPDU in STP

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Summarize How STP works to Eliminate
Layer 2 Loops in a Converged Network
ƒ Describe the role of STP port states and BPDU timers
in the operation of STP

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Explain How the STP Algorithm Uses Three
Steps to Converge on a Loop-Free Topology
ƒ Define convergence for a switched network and
summarize the 3 step process STP uses to create a
loop free topology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Explain How the STP Algorithm Uses Three
Steps to Converge on a Loop-Free Topology
ƒ Explain the STP decision sequence is used to elect a
root bridge for a network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Explain How the STP Algorithm Uses Three
Steps to Converge on a Loop-Free Topology
ƒ Describe the process of electing a root port on a switch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Explain How the STP Algorithm Uses Three
Steps to Converge on a Loop-Free Topology
ƒ Describe the process of electing designated ports and
non-designated ports on a switch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
Explain How the STP Algorithm Uses Three
Steps to Converge on a Loop-Free Topology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21
Explain How the STP Algorithm Uses Three
Steps to Converge on a Loop-Free Topology

The port ID is appended to the


port priority. For example, switch
port F0/2 has a default port
priority value of 112.2, where
112 is the configurable port
priority value, and .2 is the port
ID. (128 default)

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Explain How the STP Algorithm Uses Three
Steps to Converge on a Loop-Free Topology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 23
Cisco PortFast Technology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Cisco PortFast Technology

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 25
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN
ƒ Summarize the features of the PVST+, RSTP and rapid
PVST+ variants of STP

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN
ƒ Describe the features of PVST+

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 27
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 28
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 29
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN
ƒ Describe the features of RSTP

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 30
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 31
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN
ƒ Describe RSTP edge ports

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 32
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN
ƒ Describe the RSTP link types

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 33
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN
ƒ Describe the RSTP port states and port roles

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 34
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN
ƒ Describe how to configure rapid PVST+

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 35
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN
ƒ Describe how to configure rapid PVST+

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 36
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN
ƒ Describe how to design STP to avoid problems

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 37
Implement Rapid per VLAN Spanning
Tree (rapid PVST+) in a LAN
ƒ Describe how to identify and solve the key STP
configuration issues

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 38
Summary
ƒ Spanning Tree Protocol (STP) is used to prevent loops
from being formed on redundant networks
ƒ STP uses different port states & timers to logically
prevent loops
ƒ There is at least one switch in a network that serves as
the root bridge
Root bridge is elected using information found in BPDU frames

ƒ Root ports are determined by the spanning tree


algorithm and are closest to the root bridge

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 39
Summary

ƒ STP lengthy convergence time (50 seconds) facilitated


the development of:
RSTP
convergence time is slightly over 6 seconds
Rapid PVST+
adds VLAN support to RSTP
is the preferred spanning-tree protocol on a Cisco switch
netowrk

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 40
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 41
Implement Inter-
VLAN Routing

LAN Switching and Wireless – Chapter 6

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Explain to the satisfaction of a qualified instructor how
network traffic is routed between VLANs in a
converged network.
ƒ Configure inter-VLAN routing on a router to enable
communications between end-user devices on
separate VLANs
ƒ Troubleshoot common inter-VLAN connectivity
issues.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Explain How Network Traffic is Routed
Between VLANs in a Converged Network

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Explain How Network Traffic is Routed
Between VLANs in a Converged Network
ƒ Describe the routing options between VLANs

native

802.1q

native

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Explain How Network Traffic is Routed
Between VLANs in a Converged Network
ƒ Describe the role of interfaces and subinterfaces in
supporting inter-VLAN routing

802.1q

802.1q

native

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Configure Inter-VLAN Routing

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Configure Inter-VLAN Routing

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Configure Inter-VLAN Routing
ƒ Performance
-Because there is no contention for bandwidth on separate
physical interfaces, physical interfaces have better performance
when compared to using subinterfaces.
-When subinterfaces are used for inter-VLAN routing, the traffic
being routed competes for bandwidth on the single physical
interface.

ƒ Access Ports and Trunk Ports


-Connecting physical interfaces for inter-VLAN routing requires
that the switch ports be configured as access ports.
-Subinterfaces require the switch port to be configured as a
trunk port so that it can accept VLAN tagged traffic on the trunk
link.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Configure Inter-VLAN Routing
ƒ Cost - financially, it is more cost-effective to use
subinterfaces over separate physical interfaces.
Routers that have many physical interfaces cost more
than routers with a single interface. The same with
switches.
ƒ Complexity
-Using subinterfaces for inter-VLAN routing results in a less
complex physical configuration than using separate physical
interfaces, because there are fewer physical network cables
interconnecting the router to the switch.
-On the other hand, using subinterfaces with a trunk port results
in a more complex software configuration, which can be
difficult to troubleshoot.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Configure Inter-VLAN Routing
ƒ Port Limits
-Physical interfaces are configured to have one interface per
VLAN on the network. On networks with many VLANs, using a
single router to perform inter-VLAN routing is not possible.
Routers have physical limitations that prevent them from
containing large numbers of physical interfaces.
-Subinterfaces allow a router to scale to accommodate more
VLANs than the physical interfaces permit. Inter-VLAN routing
in large environments with many VLANs can usually be better
accommodated by using a single physical interface with many
subinterfaces.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Troubleshoot Common Inter-VLAN
Connectivity Issues
ƒ When using the traditional routing model for inter-VLAN
routing, ensure that the switch ports that connect to the
router interfaces are configured on the correct VLANs.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Troubleshoot Common Inter-VLAN
Connectivity Issues
ƒ When you suspect that there is a problem with a switch
configuration, use the various verification commands to
examine the configuration and identify the problem.
ƒ One of the most common inter-VLAN router
configuration errors is to connect the physical router
interface to the wrong switch port, placing it on the
incorrect VLAN and preventing it from reaching the
other VLANs.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Troubleshoot Common Inter-VLAN
Connectivity Issues
ƒ Describe the common switch configuration Issues

VLAN
mismatch

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Troubleshoot Common Inter-VLAN
Connectivity Issues
ƒ Describe the common IP Addressing Issues

Wrong
Address
Space

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Troubleshoot Common Inter-VLAN
Connectivity Issues
ƒ Describe the common IP Addressing Issues

Trunk
problem

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Troubleshoot Common Inter-VLAN
Connectivity Issues

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Summary
ƒ Inter-VLAN routing is the process of routing information
between VLANs
ƒ Inter-VLAN routing requires the use of a router or a
layer 3 switch
ƒ Traditional inter-VLAN routing
Requires multiple router interfaces that are each connected to
separate VLANs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Summary
ƒ Router on a stick
this is an inter-VLAN routing topology that uses router sub
interfaces connected to a layer 2 switch.
Each Subinterface must be configured with:
An IP address
Associated VLAN number

ƒ Configuration of inter VLAN routing


–Configure switch ports connected to router with correct VLAN
–Configure each router subinterface with the correct IP address
& VLAN ID

ƒ Verify configuration on switch and router

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Configure a Wireless
Router

LAN Switching and Wireless – Chapter 7

ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
ƒ Describe the components and operations of basic
wireless LAN topologies.
ƒ Describe the components and operations of basic
wireless LAN security.
ƒ Configure and verify basic wireless LAN access.
ƒ Configure and troubleshoot wireless client access.

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Explain the Components and Operations
of Basic Wireless LAN Topologies
ƒ Describe why wireless LANs are a popular choice for
small business LAN implementations

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
Explain the Components and Operations
of Basic Wireless LAN Topologies
ƒ Describe the 802.11 wireless standards

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Explain the Components and Operations
of Basic Wireless LAN Topologies
ƒ Describe the components of a 802.11-based wireless
infrastructure

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Explain the Components and Operations
of Basic Wireless LAN Topologies
ƒ Describe how wireless networks operate

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Explain the Components and Operations
of Basic Wireless LAN Topologies
ƒ Describe how to plan a wireless LAN

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Explain the Components and Operations
of Basic Wireless LAN Security
ƒ Describe the threats to wireless LAN security

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Explain the Components and Operations
of Basic Wireless LAN Security
ƒ Describe the wireless protocols. The description will
include a description of 802.1x, a comparison of WPA
and WPA2 as well as comparison of TKIP and AES

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Explain the Components and Operations
of Basic Wireless LAN Security
ƒ Describe how to secure a wireless LAN from the key
security threats

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Configure and Verify Basic Wireless LAN
Access
ƒ Configure a wireless access point

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Configure and Verify Basic Wireless LAN
Access
ƒ Configure a wireless NIC

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Configure and Troubleshoot Wireless
Client Access
ƒ Describe how to solve access point firmware issues

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Configure and Troubleshoot Wireless
Client Access
ƒ Describe how to solve incorrect channel settings

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Configure and Troubleshoot Wireless
Client Access
ƒ Describe how to solve common RF interference issues

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
Configure and Troubleshoot Wireless
Client Access
ƒ Describe how to correct antenna misplacement

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Configure and Troubleshoot Wireless
Client Access
ƒ Describe how to solve the common problems
associated with wireless LAN encryption types

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Configure and Troubleshoot Wireless
Client Access
ƒ Describe how to solve authentication problems
associated with wireless LANs

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
Summary
ƒ Wireless LANs use standards such as
IEEE 802.11a
IEEE 802.11b
IEEE 802.11g
IEEE 802.11n

ƒ Basic Service set


–Mobile clients use a single access point for connectivity

ƒ Extended service set


–Multiple access point that share an SSID

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Summary
ƒ WLAN security practices/methods include
–MAC address filtering
–SSID making
–Implementing WPA2

ƒ Configuration of wireless NIC and access point


–Configure both of them the same way
•SSID
–Ensure that the latest firmware is installed

ƒ Troubleshooting WLANs include doing the following:


–Check channel setting
–Check for interference

ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20
ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 21

Vous aimerez peut-être aussi