Home

Chapter 2: Basic Switching Concepts and Configuration 2.0.1.1 Introduction

  • 2.0 Basic Switching Concepts and Configuration
    • 2.0.1 Introduction
      • 2.0.1.1 Introduction
      • 2.0.1.2 Activity – Stand By Me
  • 2.1 Basic Switch Configuration
    • 2.1.1 Configure a Switch with Initial Settings
      • 2.1.1.1 Switch Boot Sequence
      • 2.1.1.2 Recovering From a System Crash
      • 2.1.1.3 Switch LED Indicators
      • 2.1.1.4 Preparing for Basic Switch Management
      • 2.1.1.5 Configuring Basic Switch Management Access with IPv4
      • 2.1.1.6 Lab - Basic Switch Configuration
    • 2.1.2 Configure Switch Ports
      • 2.1.2.1 Duplex Communication
      • 2.1.2.2 Configure Switch Ports at the Physical Layer
      • 2.1.2.3 Auto-MDIX
      • 2.1.2.4 Verifying Switch Port Configuration
      • 2.1.2.5 Network Access Layer Issues
      • 2.1.2.6 Troubleshooting Network Access Layer Issues
  • 2.2 Switch Security: Management and Implementation
    • 2.2.1 Secure Remote Access
      • 2.2.1.1 SSH Operation
      • 2.2.1.2 Configuring SSH
      • 2.2.1.3 Verifying SSH
      • 2.2.1.4 Packet Tracer - Configuring SSH
    • 2.2.2 Security Concerns in LANs
      • 2.2.2.1 Common Security Attacks: MAC Address Flooding
      • 2.2.2.2 Common Security Attacks: DHCP Spoofing
      • 2.2.2.3 Common Security Attacks: Leveraging CDP
      • 2.2.2.4 Activity - Identify Common Security Attacks
    • 2.2.3 Security Best Practices
      • 2.2.3.1 Best Practices
      • 2.2.3.2 Network Security Tools and Testing
      • 2.2.3.3 Network Security Audits
    • 2.2.4 Switch Port Security
      • 2.2.4.1 Secure Unused Ports
      • 2.2.4.2 DHCP Snooping
      • 2.2.4.3 Port Security: Operation
      • 2.2.4.4 Port Security: Violation Modes
      • 2.2.4.5 Port Security: Configuring
      • 2.2.4.6 Port Security: Verifying
      • 2.2.4.7 Ports in Error Disabled State
      • 2.2.4.8 Network Time Protocol (NTP)
      • 2.2.4.9 Packet Tracer - Configuring Switch Port Security
      • 2.2.4.10 Packet Tracer - Troubleshooting Switch Port Security
      • 2.2.4.11 Lab - Configuring Switch Security Features
  • 2.3 Summary
    • 2.3.1 Summary
      • 2.3.1.1 Activity – Switch Trio
      • 2.3.1.2 Packet Tracer - Skills Integration Challenge
      • 2.3.1.3 Summary
  • Expand All
  • Collapse All