Imate žicu za učenje?

Overview/Description Knowing the function of VLANs and trunks and how to configure them is the core knowledge needed for building a switched network. VLANs can span across the whole network or they can be configured to remain local. VLANs play a critical role in deployment of voice and wireless networks. Even if you are not a specialist in one of those two fields, it is important to understand their basics because both voice and wireless often rely on a basic switched network. When you create VLANs, their names and descriptions are stored in a VLAN database. There is a mechanism called VTP...
Overview/Description Configuring IPv4 IP addresses on every device in the network can be a burdensome task. DHCP greatly reduces that administrative overhead and offers some additional features. DHCP can be used even to assign a specific IP address to a device. This can be useful for servers in your network. There are also DHCP options that offer additional information that can be pushed down to DHCP clients. Probably the most common example is DHCP option 150, which is used to tell IP phones the IP address of a TFTP server. IPv6 has a number of dynamic address allocation mechanisms,...
Overview/Description A redundant topology can eliminate the possibility of a single point of failure causing a loss of function for the entire network; While it has benefits, a redundant topology also causes problems, such as loops. STP provides network link redundancy while eliminating these problems. In this course you will learn the need, standards, and operation of STP. You will also be able to explain BPDUs, the root bridge, the root port, and the designated port selection process. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification...
Overview/Description STP is a very mature protocol, benefiting from years of development and production deployment. However, STP makes assumptions about the quality of the network, and the protocol can fail. Those failures are generally high-profile failures because of the extent to which they impact the network. STP is designed to never open a loop, even temporarily, during its operation. However, like any protocol, it is based on some assumptions that might not be valid in the network. To help STP converge faster and for the protocol behavior to match your network infrastructure, several...
Overview/Description To transport packets among VLANs, you need a Layer 3 device. This device can be either a router or a switch with Layer 3 capabilities. Inter-VLAN routing can be performed by an external router that uses a separate link for each VLAN. Because the number of physical connections on a switch is limited, this solution is not scalable. A better solution is to have a single trunk link, between the router and the switch, that carries data for all VLANs. This setup is commonly called a router on a stick or a one-armed router. A convenient solution is to have a device, such as a...
Overview/Description Continuous access to applications, data, and content demands a network wide resilience to increase IP network availability. A high-availability network is achieved by applying network-level resiliency, system-level resiliency, management, and monitoring. Network-level resiliency is achieved by adding redundant devices and connections into the network. System-level resiliency is achieved by adding redundant modules, such as power supplies, supervisor engines, and other components, to a modular device. Added redundancy often results in added complexity of the network....
Overview/Description FHRP is a networking protocol that is designed to protect the default gateway by allowing two or more routers or Layer 3 switches to provide a backup for that address. If one first-hop device fails, the backup router will take over the address, by default within a few seconds. FHRP is a category of protocols that includes the HSRP protocol. HSRP has versions that support first-hop redundancy not only in IPv4 environments, but also in IPv6 environments. However, not all platforms and their Cisco IOS versions support the different versions of FHRPs for both IPv4 and IPv6....
Overview/Description Layer 2 security implementation is often forgotten. However, you should take the basic security measures to guard against a host of attacks that can be launched at a switch and its ports. Two common security measures are implementing port security and port access lists. Network or host misconfigurations, host malfunctions, or intentional DoS attacks may flood the network with traffic storms. Cisco IOS switches provide the storm control feature to limit the impact of traffic storms and, if necessary, take appropriate actions. In this course you'll learn what a traffic...
Overview/Description While much attention focuses on security attacks from outside the walls of an organization and at the upper OSI layers, campus access devices and Layer 2 communication are largely unconsidered in most security discussions. Only authorized devices and users should be able to access ports on your access layer switches. In this course you will learn about a more centralized security solution that is the AAA framework. Equipment malfunction and malicious attacks can bring down your network. You will also learn how storm control mechanisms, DHCP snooping, IP source guard,...
Overview/Description Redundant topology can eliminate the possibility of a single point of failure causing a loss of function for the entire network While it has benefits, redundant topology also causes problems, such as loops. STP provides network link redundancy while eliminating these problems. The course covers RSTP implementation including the need, standards, and operation of STP. This course also covers BPDUs, and the Root Bridge, Root Port, and Designated Port selection process. In addition this course lists and explains STP and RSTP port states, concepts of PVST, RSTP and STP port...

Koraci do učenja

1Prijavi se

Prijavite se, a ako nemate korisničko ime, registrirajte se.

2Pronađi i upiši program

Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.

3Uči

Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

»Detaljne upute

Trebate pomoć?