Routing and Switching Fundamentals Part 2

Category:
- Networking
Sessions:
4
Hours:
10
Exam:
640-816
SKU:
TS563728 $100.00
Related Courses
Course Description:
This second part of Routing and Switching will prepare you for the CCNA exam 640-816. Tom Carpenter will take you through the topics of VLSM, IPv6, OSPF, EIGRP protocols and learn to use access lists using NAT and DHCP. Work with point-to-point connections and Frame Relay. Learn to configure and troubleshoot VLAN and interswitch communications. Work with various routing methods and use trace methods to understand the various implementations available. Understand security implementation options using ACL's and NAT.
Course Outline
Session 1
Section A: Introduction
- Series Objectives
- Icons and Symbols
Section B: VLAN and Trunking
- VLAN Usage
- Segmentation
- Router Gateway
- Router Options
- VLAN Routing Design
- VLAN Campus Design
- Trunking Protocols
- Comparing ISL and 802.1Q
Section C: VLAN Trunking Protocol
- VTP
- VTP Modes
- VTP Operation
- VTP Messages
- VTP Pruning
Section D: Configuring and Verifying VLANs
- Prerequisites for VLANs
- Other Prerequisites for VLANs
- Creating a VLAN
- Viewing VLANs
- Creating VLANs
- Enabling Trunks
- Configuring VTP Domains
- Assigning Ports
Section E: Configuring VLAN Trunking
- Considerations for VLAN Trunking
- Configuring a Trunk
- Verifying Trunking
- Controlling Access to VLANs
- VLAN Access Example
Section F: Configuring and Verifying VTP
- Configuring VTP
- Verifying VTP Status
- Reviewing VTP Configuration Commands
- Cautions while Configuring VTP
- Problems with VTP Configuration
- Configuring Transparent Mode
Section G: Troubleshooting VTP
- Troubleshooting Methodologies
- Identifying VTP Problems
- Troubleshooting VTP Problems
- New Switch Connection Problems
- Troubleshooting New Switch Connections
- Practices to Avoid VTP Problems
Section H: Implementing Switch Security
- Implementing Port Security
- Configuring and Verifying Port Security
- Checking for Port Security Problems
- Troubleshooting Port Security
- VLAN and Trunking Problems
- Ensuring Right Access Interface
- Ensuring Access VLANs are Active
- Trunks and VLAN Forwarding
- Troubleshooting the Data Plane
Session 2
Section A: Spanning Tree Protocol Enhancements
- Cisco Enhancements to STP
- PortFast
- UplinkFast
- BackboneFast
- EtherChannel
- Configuring EtherChannel
Section B: Rapid STP
- RSTP
- RSTP Types of Links and Edges
- RSTP Port States
- RSTP Port Roles
- RSTP Convergence
- RSTP Convergence Example
- Configuring RSTP
Section C: Per-VLAN Spanning Tree Plus
- PVST+
- Using PVST+ for Load Balancing
- Troubleshooting STP
- Identifying the Root Switch
- Identifying the Root Port
- Determining the Designated Port
Section D: VLSM and Route Summarization
- VLSM
- Requirements for Using VLSM
- Overlapping VLSM Subnets
- Designing a Subnetting Scheme
- Steps to Design a Subnetting Scheme
- Subnetting Scheme Example
- Adding a New Subnet
Section E: Manual Route Summarization
- Route Summarization
- Basic Concepts of Route Summarization
- Central Routing Table
- Site A and Site B Routing Tables
- Strategies for Route Summarization
- Route Summarization Example
Section F: Autosummarization
- Route Autosummariztion
- Using Autosummarization
- Discontiguous Classful Networks
- Configuring Autosummarization
Section G: Running IPv6
- Migrating to IPv6
- Advantages of Using IPv6
- IPv6 Address Conventions
- Conventions for Writing IPv6 Prefixes
- Assigning IPv6 Prefixes
Section H: Technological Requirements for IPv6
- IPv6 Routing Protocols
- Configuring IPv6
- IPv4/IPv6 Dual Stacks
- Tunneling
- Types of Tunneling
- Using NAT-PT
Section I: Resolving IP Addressing Problems
- IP Address Conflicts
- Resolving IP Conflicts
- Manually Fixing IP Conflicts
Session 3
Section A: Routing Protocols
- Types of Routing Protocols
- IGP Routing Protocols
- Distance-Vector Routing Protocols
- Link-State Routing Protocols
- Comparing IGPs
Section B: Open Shortest Path First
- OSPF
- Configuring OSPF
- Configuring OSPF in Single Area
- Authenticating OSPF
- Troubleshooting the OSPF Interface
Section C: Enhanced IGRP
- EIGRP
- Steps to Configure EIGRP
- Configuring EIGRP
- Authenticating EIGRP
- Troubleshooting the EIGRP Interface
Section D: Verifying Connectivity
- The ping Command
- Extended ping Command
- The traceroute Command
- The telnet and SSH Commands
Section E: Troubleshooting Routing
- Isolating IP Routing Problems
- Isolating IP Routing Problems Example
- IP Routing Problems Related to Routers
- Troubleshooting Forward Route Problems
- Troubleshooting Reverse Route Problems
Section F: Implementing Basic Router Security
- Configuring Basic Router Security
- Implementing Access Security to Router
- Implementing Route Process Security
- Logging, NTP, and User LAN Security
- Basic Router Security Tips
Session 4
Section A: Access Control Lists
- Working with ACLs
- Filtering Logic
- Standard IP ACLs
- Extended IP ACLs
- Standard vs. Extended IP ACLs
Section B: Configuring ACLs
- Standard ACL Command Syntax
- Extended ACL Command Syntax
- Deny
- Permit
- Denying FTP
- Assigning ACLs
- Configuring ACLs
- Verifying Access
- Creating Access List
- Denying Web Access
- Assigning and Verifying ACL
- Controlling Telnet and SSH Access
Section C: Monitoring ACL Configuration
- Using Named IP Access Lists
- Using Sequence Numbers to Edit ACLs
- Edit ACLs Example
Section D: Access List Troubleshooting
- Considerations for Implementing ACLs
- Troubleshooting Access Lists
Section E: Network Address Translation
- NAT Address Swapping
- Static NAT
- Dynamic NAT
- Configuring Static NAT
- Configuring Dynamic NAT
- Verifying NAT Operations
- Troubleshooting NAT
Section F: Fundamentals of Frame Relay
- Frame Relay
- Frame Relay Local Addressing
- Frame Relay Global Addressing
- Configuring and Verifying Frame Relay
- Steps to Configure Frame Relay
- Fully Meshed Network with One IP Subnet
- Configuring the Encapsulation and LMI
- Verifying a Frame Relay
Section G: Point-to-Point Protocol
- HDLC
- PPP
- PPP Authentication
- Configuring Basic PPP
- Configuring and Verifying CHAP
- Configuring PAP
Section H: Virtual Private Networks
- VPN
- Design Goals of VPN
- Benefits of VPN
- Types of VPNs
- VPN Supporting Devices
- IPSec Encryption
- IPSec Key Exchange
- Considerations for Implementing IPSec
Section I: WAN Implementation Issues
- Problems in Frame Relay WANs
- Possible Causes of WAN Problems
- Resolving WAN Problems
- Resolving Frame Relay WAN Problems