-
Foundation Learning Guide Topic Headers
Switching IntroductionHubs and SwtichesBridges and
SwitchesSwitches of TodayBroadcast DomainsMAC AddressesThe Basic
Ethernet Frame FormatBasic Switching FunctionVLANsThe Spanning Tree
ProtocolTrunkingPort-ChannelsMultiLayer Switching (MLS)
Campus Network StructureHierarchical Network DesignAccess
LayerDistribution LayerCore LayerLayer 3 in the Access LayerThe
Cisco Enterprise Campus ArchitectureThe need for a Core Layer
Types of Cisco SwitchesComparing Layer 2 and Multilayer
SwitchesMAC Address ForwardingLayer 2 Switch OperationLayer 3
Switch Operation
Frame RewriteDistributed Hardware Forwarding
Cisco Switching MethodsRoute CachingTopology Based Switching
Important Note: This content mapping was created using the
available draft chapters of the SWITCH Foundation Learning Guide
(300-115), and may not be accurate with relation to the book when
published
Foundation Learning Guide Chapter
Ch1 Fundamentals Review
Ch2 Campus Network Design Fundamentals
Useful commands for viewing and editing Catalyst switch MAC
address tables
-
Hardware Forwarding Details
Implementing VLANs and Trunks in a Campus EnvironmentVLAN
OverviewVLAN SegmentationEnd-to-End VLANsLocal VLANsComparison of
End-to-End VLANs and Local VLANsMapping VLANs to a hierarchical
networkImplementing Trunks in a Campus EnvironmentUnderstanding
Native VLAN in 802.1Q TrunkingUnderstanding DTPCisco Trunking Modes
and MethodsVLAN Ranges and MappingsVLAN Ranges
Configuring, Verifying, and Troubleshooting VLANs and
TrunksVerifying VLAN configuration
Configuring VLANs and Trunks
Best Practices for VLANs and TrunkingVoice VLAN overviewSwitch
configuration for wireless network supportVLAN Trunking ProtocolVTP
OverviewVTP ModesVTP VersionsVTP Pruning
VTP AuthenticationVTP AdvertisementsVTP Message typesSummary
AdvertisementsSubset AdvertisementsAdvertisement Requests
Configuring and verifying VTPOverwriting VTP configuration
Ch2 Campus Network Design Fundamentals
Ch3 Campus Network Architecture
-
Best Practices for VTP implementationImplementing EtherChannel
in a Switched NetworkThe need for EtherChannelEtherChannel Mode
InteractionsLACPPAgPLayer 2 EtherChannel configuration
guidelinesEtherChannel Load-Balancing optionsConfiguring
EtherChannel in a switched network
EtherChannel configuration and Load-Balancing
EtherChannel Guard
Spanning Tree Protocol OverviewSTP OverviewSTP Operation
Bridge Protocol Data Unit (BPDU)Root Bridge ElectionRoot port
ElectionDesignated Port ElectionSTP Port StatesPer-VLAN STPSTP
Topology ChangesRapid Spanning Tree Protocol
RSTP Port Roles
Comparison of RSTP and STP Port States
RSTP Topology ChangesRSTP LinkTypesConfiguring and Modifying STP
BehaviorChanging STP PrioritySTP Path Manipulation
STP TimersImplementing STP Stability Mechanisms
UplinkFast
BackboneFast
Ch3 Campus Network Architecture
Ch4 Spanning Tree Implementation
-
PortFast
Securing PortFast Interface with BPDU Guard
Disabling STP with BPDU Filter
Root Guard
Loop Guard Overview
UDLD
UDLD Recommended PracticesFlexLinksSTP Stability Mechanisms
RecommendationsImplementing Multiple Spanning Tree Protocol
Introducing Multiple Spanning Tree ProtocolMST Regions
STP Instances with MSTExtended System ID for MST
Configuring MST
Configuring MST Path Cost
Configuring MST Port Priority
MST Protocol Migration
Ch4 Spanning Tree Implementation
-
MST Recommended Practice
Ch5 InterVLAN Routing
Implementing Inter-VLAN RoutingDescribing Inter-VLAN
RoutingIntroduction to Inter-VLAN Routing
Inter-VLAN Routing using an External Router Overview
Configuring InterVLAN Routing using an External Router
Routing with an External Router
External Router: Advantages and Disadvantages
Inter-VLAN Routing Using Switch Virtual InterfacesSVI:
Advantages and Disadvantages
Routing with Routed PortsRouted Port: Advantage and
Disadvantage
Configuring InterVLAN Routing using SVI and Routed Ports
Overview
Routing on a Multilayer SwitchSVI autostate exclude
SVI Configuration ChecklistTroubleshooting Inter-VLAN
Problems
Layer 2 vs. Layer 3 EtherChannel
Layer 3 EtherChannel configuration
Verifying Routing ProtocolImplementing DHCPConfiguring DHCP in
Multilayer Switched networkDHCP RelayDHCP Options
First Hop Redundancy Protocols Introduction Overview of FHRP and
HSRP
Ch4 Spanning Tree Implementation
Ch6 First Hop Redundancy Protocols
-
The Need for First Hop Redundancy HSRP State Transition HSRP and
STP Configuring and Tuning HSRPForwarding Through Active Router
Load Sharing with HSRP The Need for Interface Tracking with
HSRPHSRP Interface Tracking HSRP and Object Tracking HSRP
Authentication HSRP Timers HSRP Versions VRRPConfiguring Layer
Redundancy with VRRPAbout VRRP Configure VRRP and Spot the
Difference
VRRP and Authentication
Tracking and VRRP
HSRP vs GLBP GLBP States GLBP Operation Explained GLBP Load
Balancing Options
GLBP Authentication
GLBP and STP
Tracking and GLBP
Network ManagementAAAAuthenetication OptionsRADIUS and TACACS+
OverviewRADIUS Authentication ProcessTACACS+ Authentication
ProcessConfiguring AAAConfiguring RADIUS for Console and VTY
AccessConfiguring TACACS+ for Console and VTY AccessAAA
AuthorizationAAA AccountingLimitations of TACACS+ and RADIUS
Ch6 First Hop Redundancy Protocols
Introducing GLBP
Ch 7 Network Management
-
Identify-based Networking
IEEE 802.1x Port-Based Authentication OverviewIEEE 802.1x
Configuration Checklist
Network Time Protocols
The Need for Accurate TimeConfiguring the System Clock
Manually
Network Time Protocol Overview
NTP Modes
Other NTP Configuration Options
NTP Example
NTP Design PrinciplesSecuring NTP
NTP VersionsNTP in IPv6 Topologies
SNTP Overview
PTP/IEEE-1588
SNMPv3SNMP OverviewSNMP VersionsSNMP Best PracticesSNMPv3
Configuration ExampleVerifying SNMP Version 3 Configuration
Discovery ProtocolsIntroduction to LLDPBasic configuration of
LLDPDiscovery neighbors using LLDPUnidirectional Link Detection
(UDLD)
UDLD Mechanisms and SpecificsUDLD Configuration and Example
Ch 7 Network Management
Ch 8 Switching Features and Technologies
-
Leveraging UDLD and STP LoopGuard Together
Power of Ethernet (POE)PoE ComponentsPoE StandardsPoE
NegotiationConfiguring and Verifying PoE
SDM TemplatesSDM Templates TypesChoosing the Right SDM
Template
System Resource Configuration on Other Platforms
Monitoring Features (SPAN and RSPAN)
SPAN and RSPAN OverviewSPAN Configuration
RSPAN ConfigurationIP SLAIntroduction to IP SLAIP SLA Source and
ResponderIP SLA ConfigurationIP SLA Operation with ResponderIP SLA
TimestampsConfiguring Authentication for IP SLAIP SLA Example For
UDP Jitter
Ch 9 High Availability
High Availability The Need for Logical Switching
Architectures
What is StackWise?StackWise BenefitsVerifying StackWiseWhat is
VSS?VSS BenefitsVerifying VSS
Ch 8 Switching Features and Technologies
-
Ch 9 High Availability
Redundant Switch Supervisors
Supervisor Redundancy Modes
Stateful Switchover (SSO)
Nonstop Forwarding (NSF)
Campus Network Security
Overview of Switch Security Issues
Cisco Switch Recommended Security Configuration Best
PracticesCampus Network Vulnerabilities
Rogue Access
Switch Vulnerabilities
MAC Flooding Attack
Introducing Port Security
Port Security ConfigurationPort Error ConditionsError-Disabled
Automatic Recovery
Port Access ListsStorm Control
Introduction to Storm ControlConfiguring Storm Control on an
InterfaceMitigating Spoofing Attacks
DHCP Spoofing Attacks
DHCP Snooping
DHCP Option 82
Ch 10 Campus Network Security
-
DHCP Snooping Example Configuration
IP Source GuardIP Source Guard Configuration
ARP Spoofing
Dynamic ARP InspectionDIA ConfigurationSecuring VLAN Trunks
Switch SpoofingVLAN Hopping
Protecting Against VLAN Hopping
VLAN Access Lists (VACLs)
VACL interaction with ACLs and PACLs
Configuring VACLs
Private VLANsIntroduction to Private VLANsPrivate VLAN Port
TypesPrivate VLAN ConfigurationPrivate VLAN VerificationPrivate
VLANs Across Multiple Switches
Protected Port Feature
Ch 10 Campus Network Security
-
Location in Cert Guide
Topic HeaderCh2 "Switch Operation", Page 32, "Layer 2 Switch
Operation"Ch2 "Switch Operation", Pages 32-35, "Transparent
Bridging" Ch3 "Switch Port Configuration", Page 59, "Ethernet
Overview"Cert Guide does not detail MAC Address details; This is a
CCNA-Level TaskCert Guide does not detail IEEE 802.3 frame format
details; This is a CCNA-Level TaskCh2 "Switch Operation", Pages
32-35, "Transparent Bridging"Basic Definition; Ch4 "VLANs and
Trunks", Page 95, "Virtual LANs"Basic Definition; Ch6 "Traditional
Spanning Tree Protocol", Page 151 "IEEE 802.1D Overview"Basic
Definition; Ch4 "VLANs and Trunks", Pages 101-103, "VLAN
Trunks"
Basic Definition; Ch2 "Switch Operation", Page 36, "Multilayer
Switch Operation"
Topic HeaderCh1 "Enterprise Campus Network Design", Pages 7-11
"Hierachical Network Design"Ch1 "Enterprise Campus Network Design",
Page 12 "Access Layer"Ch1 "Enterprise Campus Network Design", Page
12 "Distribution Layer"Ch1 "Enterprise Campus Network Design", Page
12 "Core Layer"Ch1 "Enterprise Campus Network Design", Page 20
(Referencing Figure 1-15)Ch1 "Enterprise Campus Network Design",
Pages 13-24 "Modular Network Design"Ch1 "Enterprise Campus Network
Design", Pages 20-24 "Network Core"
Topic HeaderCh2 "Switch Operation", Pages, 32-36 "Layer 2 Switch
Operation"Ch2"Switch Operation", Pages 32-36, "Layer 2 Switch
Operation"Ch2 "Switch Operation", Pages 36-40, "Multilayer Switch
Operation"
Ch2 "Switch Operation", Pages 45-48, "Managing Switching
Tables"Ch2"Switch Operation", Page 39, (In text starting with
"During the multilayer")
Ch2 "Switch Operation", Pages 36-39, "Types of Multilayer
Switching"Ch2"Switch Operation", Page 37, "Route Caching"Ch2
"Switch Operation", Page 37, "Topology Based"
Important Note: This content mapping was created using the
available draft chapters of the SWITCH Foundation Learning Guide
(300-115), and may not be accurate with relation to the book when
published
Basic Definition; Ch10 "Aggregating Switch Links", Pages
245-247, "Switch Port Aggregation with EtherChannel"
Ch1 "Enterprise Campus Network Design", Pages 24-26 "Cisco
Products in a Hierarchical Network Design"
-
Topic HeaderCh4 "VLANs and Trunks", Page 95, "Virtual LANs"Ch4
"VLANs and Trunks", Pages 99-100, "Deploying VLANs"Ch4 "VLANs and
Trunks", Pages 100-101, "End-to-End VLANs"Ch4 "VLANs and
Trunks",Page 101, "Local VLANs"
Ch4 "VLANs and Trunks", Pages 101-105, "VLAN Trunks"
Ch4 "VLANs and Trunks", Pages 96-98, "VLAN Membership"Ch4 "VLANs
and Trunks", Page 99, (Referencing Example 4-2)
"best practices" notes are embedded throughout the chapterCh4
"VLANs and Trunks", Pages 112-116, "Voice VLANs"Ch4 "VLANs and
Trunks", Pages 117-118, "Wireless VLANs"Topic HeaderCh5 "VLAN
Trunking Protocol" Page 127, "VLAN Trunking Protocol" and "VTP
Domains"Ch5 "VLAN Trunking Protocol" Pages 127-128, "VTP Modes"Ch5
"VLAN Trunking Protocol" Pages 133-134, "Configuring the VTP
Version"Ch5 "VLAN Trunking Protocol" Pages 138-140, "VTP
Pruning"
Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP
Advertisements"Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP
Advertisements"Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP
Advertisements"Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP
Advertisements"Ch5 "VLAN Trunking Protocol" Pages 128-130, "VTP
Advertisements"
Ch5 "VLAN Trunking Protocol" Pages 132-138, "VTP
Configuration"
Ch4 "VLANs and Trunks", Page 98, (In text starting with "Next,
you should assign)Ch4 "VLANs and Trunks", Pages 106-110, "VLAN
Trunk Configuration"Ch4 "VLANs and Trunks", Pages 110-112,
"Troubleshooting VLANs and Trunks
-
"Best Practices" notes are embedded throughout the chapterTopic
HeaderCh10 "Aggregating Switch Links", Pages 245-247, "Switch Port
Aggregation with EtherChannel"Ch10 "Aggregating Switch Links", Page
251, "EtherChannel Negotiation Protocols"Ch10 "Aggregating Switch
Links", Page 252, "Link Aggregation Control Protocol"Ch10
"Aggregating Switch Links", Page 252, "Port Aggregation
Protocol"
Ch10 "Aggregating Switch Links", Pages 247-249, "Distributing
Traffic in EtherChannel"Topic Header
Ch10 "Aggregating Switch Links", Pages 255-257, "Avoiding
Misconfiguration with EtherChannel Guard"
Topic HeaderTopic Header
Ch 6 "Traditional Spanning Tree Protocol", pages 156-158,
"Electing a Root Bridge"Ch 6 "Traditional Spanning Tree Protocol",
pages 158-160, "Electing a Root Port"Ch 6 "Traditional Spanning
Tree Protocol", pages 160-162, "Electing Designated Ports"Ch 6
"Traditional Spanning Tree Protocol", pages 162-165, "STP States"Ch
6 "Traditional Spanning Tree Protocol", pages 172-174, "Types of
STP"Ch 6 "Traditional Spanning Tree Protocol", pages 167-172,
"Topology Changes"Ch 9 "Advanced Spanning Tree Protocol", Page 223,
"Rapid Spanning Tree Protocol"
Ch 9 "Advanced Spanning Tree Protocol", Page 229, "Topology
Changes and RSTP"
Ch 7 "Spanning-Tree Configuration", Pages 181-184, "STP Root
Bridge"Ch 7 "Spanning-Tree Configuration", Pages 184-188, "Root
Bridge Configuration"Ch 7 "Spanning-Tree Configuration", Pages
188-191, "Spanning-Tree Customization"
Ch 7 "Spanning-Tree Configuration", Pages 191-194, "Tuning
Spanning-Tree Convergence"Topic Header
Ch 7 "Spanning-Tree Configuration", Pages 196-197, "UplinkFast:
Access Layer Uplinks"
Ch 7 "Spanning-Tree Configuration", Pages 197-198,
"BackboneFast: Redundant Backbone Paths"
Ch10 "Aggregating Switch Links", Pages 253-255, "EtherChannel
Configuration"Ch10 "Aggregating Switch Links", Pages 249-251,
"Configure EtherChannel Load Balancing"
Ch 6 "Traditional Spanning Tree Protocol", pages 155-156,
"Spanning-Tree Communication: Bridge Protocol Data Units"
Ch 9 "Advanced Spanning Tree Protocol", Page 224 (In text
Starting with "The root bridge in a network")
-
Ch 7 "Spanning-Tree Configuration", Pages 194-196, "PortFast:
Access Layer Nodes"
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages
208-209, "BPDU Guard"
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages
207-208, "Root Guard"
Ch 8 "Protecting the Spanning Tree Protocol Topology",
Pages210-211, "Loop Guard"
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages
211-213, "UDLD"
(Not mentioned in Cert Guide)
Ch 9 "Advanced Spanning Tree Protocol", Pages 234-236,
"Spanning-Tree Instances Within MST"
(Not mentioned in Cert Guide)
Ch 8 "Protecting the Spanning Tree Protocol Topology", Pages
213-214, "Using BPDU Filtering to Disable STP on a Port"
-
(Not mentioned in Cert Guide)
Topic HeaderTopic HeaderCh 11 "Multilayer Switching", Page 268,
"InterVLAN Routing"
Cert Guide does not detail InterVLAN Routing using an External
Router; This is a CCNA-Level Task
Cert Guide does not detail InterVLAN Routing using an External
Router; This is a CCNA-Level Task
Cert Guide does not detail InterVLAN Routing using an External
Router; This is a CCNA-Level Task
Cert Guide does not detail InterVLAN Routing using an External
Router; This is a CCNA-Level Task
Ch 11 "Multilayer Switching", Page 269-270, " Configuring
InterVLAN Routing"
Topic Header
Topic Header
Ch 11 "Multilayer Switch", Pages 280-284, "Verifying Multilayer
Switching"Ch 11 "Multilayer Switch", Page 272, (In text Starting
with "Be aware that an SVI")
(L3 EtherChannel not mentioned)
Topic HeaderCh 12 "Configuring DHCP", Pages 293-294,
"Configuring an IPv4 DHCP Server"Ch 12 "Configuring DHCP", Pages
296, "Configuring DHCP Relay"Ch 12 "Configuring DHCP", Pages 296,
"Configuring DHCP Options"
Topic Header in Certification Guide Ch 13, Layer 3 High
Availability, "Hot Standby Router Protocol", Page 385
Ch 11 "Multilayer Switching", Pages 268-269, "Types of
Interfaces"Ch 11 "Multilayer Switching", Pages 270-272, (In text
starting with "Layer 2 Port Configuration")
-
Ch 13, Layer 3 High Availability, "HSRP Router Election", Page
386
Ch 13, Layer 3 High Availability,"HSRP Gateway Addressing" ,
Page 390
Ch 13, Layer 3 High Availability,"Load Balancing with HSRP",
Page 391Ch 13, Layer 3 High Availability,"Conceding the Election",
Page 389 Ch 13, Layer 3 High Availability,Conceding the Election,
Page 389 Not covered in the Certification Guide
Not covered in the Certification Guide Not covered in the
Certification Guide Ch 13, Layer 3 High Availability,"VRRP", Pages
394 -396Ch 13, Layer 3 High Availability,"VRRP", Page 394Not
covered in the Certification Guide Ch 13, Layer 3 High
Availability,"VRRP", Page 394
Not covered in the Certification Guide
Not covered in the Certification Guide Ch 13, Layer 3 High
Availability,"GLBP", Page 397Not covered in the Certification
Guide
Chapter 13, Layer 3 High Availability,"GLBP Load Balancing" ,
Page 400
Not covered in the Certification Guide
Not covered in the Certification Guide
Not covered in the Certification Guide
Ch 19, Securing Switch Access, "AAA", Page 464
Ch 19, Securing Switch Access,TACACS+ and RADIUS, Page 464 Ch
19, Securing Switch Access,TACACS+ and RADIUS, Page 464 Ch 19,
Securing Switch Access,TACACS+ and RADIUS, Page 464 Ch 19, Securing
Switch Access,Configuring Authentication, Page 465-471 Ch 19,
Securing Switch Access,Configuring Authentication, Page 467
Not addressed in FLG version 7.0
Ch 13, Layer 3 High Availability,"Plain Text Authentication",
Page 388 ," MD5 Authentication", Page 388,
Ch13, Layer 3 High Availability,"Active Virtual Gateway", P age
397Ch 13, Layer 3 High Availability,"Active Virtual Forwarder",
Page 398
-
Ch 19, Securing Switch Access,Port Based Auentication, Page 418
Ch 19, Securing Switch Access,802.1x Configuration, Page 419
-421
Ch 13, Logging Switch Activity: Using NTP to Synchrnoize with an
External Time Source, Page 313
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with
an External Time Source", Page 313 Ch 13, "Logging Switch Activity:
Setting the Internal System Clock", page 312
Ch13,"Logging Switch Activity: Using NTP to Synchrnoize with an
External Time Source", Page 313
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with
an External Time Source", Page 314
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with
an External Time Source", Page 314
Ch 13, "Logging Switch Activity:Securing NTP", Page 316
Ch 13, "Logging Switch Activity", "Using NTP to Synchronize with
an External Time Source", Page 313 Not covered in the Certification
Guide
Ch 13, "Logging Switch Activity:Using SNTP to Synchronize Time",
Page 316
Not covered in the Certification Guide
Ch 14: Managing Switches with SNMP, "SNMP Overview", Page 324Ch
14: Managing Switches with SNMP, "SNMP Overview", Page 324Ch 14:
Managing Switches with SNMP, "SNMP Overview", Page 325Ch 14:
Managing Switches with SNMP, "SNMP Overview", Page 325Cha 14:
Managing Switches with SNMP,Configuring SNMPv3, Page 328 Not
covered in the Certification Guide
Ch 3: Switch Port ConfigurationCh 3: Switch Port Configuration,
"Link Layer Discover Protocol", Page 75Ch 3: Switch Port
Configuration, "Link Layer Discover Protocol", Page 75-76Ch 3:
Switch Port Configuration, "Link Layer Discover Protocol", Page
75-76Ch 8: Protecting the Spanning-Tree Topology, "UDLD", Page
211
Ch 8: Protecting the Spanning-Tree Topology, "UDLD", Page 211 Ch
8: Protecting the Spanning-Tree Topology, "UDLD", Page 211
Ch 13, "Logging Switch Activity: Using NTP to Synchrnoize with
an External Time Source", Page 315, Example 13-1 and 13-2Ch 13,
"Logging Switch Activity: Using NTP to Synchrnoize with an External
Time Source", Page 314, Figure 13-3 addresses NTP Hierarchy
-
Ch 8: Protecting the Spanning-Tree Topology, UDLD, Page 216
Ch 3: Switch Port Configuration, "Using Power over Ethernet",
Page 77 Ch 3: Switch Port Configuration,Ch 3: Switch Port
Configuration,How PoE Works, Page 78Ch 3: Switch Port
Configuration,Detecting a Powered Device, Page 79
Ch 2: Switch Operation, "Managing Switching Table Sizes", Page
49Ch 2: Switch Operation, "Managing Switching Table Sizes", Page
50-51Ch 2: Switch Operation,
Not covered in the Certification Guide
Ch 16: Using Port Mirroring to Monitor Traffic: "Using Port
Mirrorring to Monitor Traffic", Page 349-362
Ch 16: Using Port Mirroring to Monitor Traffic, "Local Span
Configuration", Page 354
Ch 16: Using Port Mirroring to Monitor Traffic "Remote SPAN",
Page 357Ch 15: Monitoring Performance with IP SLA, Page 333-346Ch
15: Monitoring Performance with IP SLA, "IP SLA Overview", Page 336
Ch 15: Monitoring Performance with IP SLA "IP SLA Overview", Page
337Ch 15: Monitoring Performance with IP SLA, "Configuring IP SLA",
Plage 338
Ch 15: Monitoring Performance with IP SLA "Configuring IP SLA" ,
Plage 339Ch 15: Monitoring Performance with IP SLA "Configuring IP
SLA" , Plage 339No specific example in Certification Guide
Ch 17: Understanding High AvailabilityCh 17: Understanding High
Availability, "Leveraging Logical Switches", Page 368
Ch 17: Understanding High Availability, "Stackwise", Page 371 Ch
17: Understanding High Availability, "Stackwise", Page 372Not
covered in the Certification Guide Ch 17: Understanding High
Availability, "Virtual Switching System", Page 372 Virtual
Switching System, Page 372
Not covered in the Certification Guide
Ch 3: Switch Port Configuration,Configuring PoE, Page
80Verifying PoE, Page 81
Ch 16: Using Port Mirroring to Monitor Traffic, "Foundation
Topics", Page 352-354, Remote SPAN, Page 356
Ch 15: Monitoring Performance with IP SLA, " Configuring IP
SLA", Page 339
-
Ch 17: Understanding High Availability, "Supervisor and Route
Processor Redundancy" Page 373- 379
Ch 17: Understanding High Availability "Configuring the
Redundancy Mode", Page 374
Ch 17: Understanding High Availability, "Redundant Switch
Supervisors", Page 373
Ch 17: Understanding High Availability,"Nonstop Forwarding",
Page 377
Cisco Switch Recommended Security Configuration Best PracticesCh
19: Securing Switch Access, "Part VII: Securing Switched Networks",
Page 411
Not covered in the Certification Guide
Not covered in the Certification Guide
Not covered in the Certification Guide
Ch 19: Securing Switch Access, "Port Security", Page 415
Ch 19: Securing Switch Access, "Port Security", Page 415 -416Ch
3: Switch Port Configuration, "Managing Error Conditions on a
Switch Port", Page 69-71 Ch 3: Switch Port Configuration, "Managing
Error Conditions on a Switch Port", Page 71
Not covered in the Certification Guide Ch 19: Securing Switch
Access, "Using Storm Control", Page 421-423
Ch 19: Securing Switch Access, "Using Storm Control", Page
421-422Ch 19: Securing Switch Access, "Using Storm Control", Page
423Prevent Spoofing Attacks, Page 449-459
Not covered in the Certification Guide
Ch 21: Preventing Spoofing Attacks, "DHCP Snooping", Page
451
Ch 21: Preventing Spoofing Attacks, "DHCP Snooping", Page
452-453
-
Ch 21: Preventing Spoofing Attacks, "DHCP Snooping" Page
452-453
Ch 21: Preventing Spoofing Attacks, "IP Source Guard", Page
453-455Ch 21: Preventing Spoofing Attacks, "IP Source Guard", Page
454-455
Ch 21: Preventing Spoofing Attacks, "Dynamic Arp Inspection",
Page 455
Ch 21: Preventing Spoofing Attacks, "Dynamic Arp Inspection",
Page 455Ch 21: Preventing Spoofing Attacks, "Dynamic Arp
Inspection", Page 456-457Ch 20: Securing VLANs Page 431-448
Ch 20: Securing VLANs, "Switching Spoofing", Page 441 Ch 20:
Securing VLANs, "VLAN Hopping", Page 443
Not covered in the Certification Guide
Ch 20: Securing VLANs "VLAN Access Lists", Page 435
Not covered in the Certification Guide
Ch 20: Securing VLANs "VLAN Access Lists", Page 436
Ch 20: Securing VLANs, Page 436-441Ch 20: Securing VLANs
"Private VLANs", Page 436-437Ch 20: Securing VLANs "Private VLANs",
Page 436-437Ch 20: Securing VLANs, "Private VLAN Configuration",
Page 438 -441, Configuration Example 20-2Not covered in the
Certification Guide Not covered in the Certification Guide
Not covered in the Certification Guide
-
Additional References and Notes
Important Note: This content mapping was created using the
available draft chapters of the SWITCH Foundation Learning Guide
(300-115), and may not be accurate with relation to the book
when
From *DRAFT* FLG Chapter: If you have a very good understanding
of switching terminology and a basic comprehensive of switching
technology, you may want to skip this chapter and begin on Chapter
2."In summary, this chapter covers the following basic switching
topics as a review to CCNA and serves a teaser for topics covered
later in chapter"
Also see Cisco Validated Designs: Campus Design Summary:
http://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2014/CampusDesignSummary-AUG14.pdf
and Campus Wired LAN Design Guide:
http://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2014/CVD-CampusWiredLANDesignGuide-AUG14.pdf
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 216-217,
"Explaining Layer 3 Switch Processing"SWITCH Foundation Learning
Guide (v6 - 642-813), Pages 220-221, "Distributed Hardware
Forwarding"SWITCH Foundation Learning Guide (v6 - 642-813), Pages
222-225, (Starting at "This section discusses the multilayer
switching forwarding methods")
-
Covers Add/Change/Delete of VLANs switchport host command
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 224-225,
("CEF can occur at following two different locations on the
switch:")Note: *DRAFT* FLG has limited coverage of CEF; use SWITCH
FLG v6 Pages 215-237 and/or Cert Guide Chapter 11 Pages 272-280 for
full coverage
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 56-57,
"Comparison of End-to-End and Local VLANs"SWITCH Foundation
Learning Guide (v6 - 642-813), Pages 57-58, "Mapping VLANs to a
Hierarchical Network"SWITCH Foundation Learning Guide (v6 -
642-813), Pages 71-72, "Understanding Native VLAN in 802.1Q
trunking"SWITCH Foundation Learning Guide (v6 - 642-813), Pages
72-73, "Understanding DTP"SWITCH Foundation Learning Guide (v6 -
642-813), Pages 72-73, "Understanding DTP"SWITCH Foundation
Learning Guide (v6 - 642-813), Page 61, "VLAN Ranges"
Assignment of a port to a VLAN, Verifying VLAN database contents
and port assignments, Configuring a Trunk.SWITCH Foundation
Learning Guide (v6 - 642-813), Pages 59-60, "Best Practices for
VLAN design" and Pages 73-74 "Best Practices for Trunking"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 84, "VTP
Authentication"VTPv1 & 2 Password Configuration: 3560 Software
Configuration Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swvtp.html#wp1035165VTPv3
Password Configuration: 3560 Software Configuration Guide
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swvtp.html#wp1312545
VTPv3: 3560 Software Configuration Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swvtp.htmlVTPv3:
Catalyst 6500 Series Switches:
http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/solution_guide_c78_508010.html
-
SWITCH Foundation Learning Guide (v6 - 642-813), Page 84, "Best
Practices for VTP Implementation"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 105-106,
"Configure Port Channels using EtherChannel"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 122-123,
"STP Operation"
Note: *DRAFT* FLG paragraph highlights the PVST+ fields Bridge
Priority, Extended System ID, and MAC Address
Note: *DRAFT* FLG uses same introduction paragraph as SWITCH
Foundation Learning Guide (v6 - 642-813), Pages 125-126, "Rapid
Spanning Tree Protocol"Also see Cisco.Com "Understanding Rapid
Spanning Tree
Protocol":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24062-146.htmlSWITCH
Foundation Learning Guide (v6 - 642-813), Pages 127-128, "RSTP Port
Roles"SWITCH Foundation Learning Guide (v6 - 642-813), Page 129,
Table 3-5, "802.1D and 802.1w Port Type and Port State
Comparison"Note: Cert Guide provides very good coverage of RSTP
Convergence between pages 225-229. This information is not present
in the *DRAFT* FLGSWITCH Foundation Learning Guide (v6 - 642-813),
Pages 129-130, "Rapid Transition to Forwarding"
Timers":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/19120-122.html
Configuring Optional Spanning-Tree Features: 3560 Software
Configuration
Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring
Optional Spanning-Tree Features: 3560 Software Configuration
Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.html
-
Configuring Optional Spanning-Tree Features: 3560 Software
Configuration
Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring
Optional Spanning-Tree Features: 3560 Software Configuration
Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring
Optional Spanning-Tree Features: 3560 Software Configuration
Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring
Optional Spanning-Tree Features: 3560 Software Configuration
Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.htmlConfiguring
Optional Spanning-Tree Features: 3560 Software Configuration
Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swstpopt.html
Configuring UDLD: 3560 Software Configuration
Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swudld.htmlSee
Cisco.Com "Best Practices for UniDirectional Link Detection
(UDLD)":http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/best/practices/recommendations.html#wp1050563SWITCH
Foundation Learning Guide (v6 - 642-813), Pages 166-167, "Flex
Links"SWITCH Foundation Learning Guide (v6 - 642-813), Pages
168-171, "Recommended Spanning Tree Practices"SWITCH Foundation
Learning Guide (v6 - 6642-813), Page 141, "Multiple Spanning Tree"
(First paragraph)SWITCH Foundation Learning Guide (v6 - 642-813),
Pages 141-143, "Multiple Spanning Tree"Also see Cisco.Com
"Understanding Multiple Spanning Tree
Protocol":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24248-147.htmlSWITCH
Foundation Learning Guide (v6 - 642-842), Pages 143-144, "MST
Regions"
SWITCH Foundation Learning Guide (v6 - 642-842), Page 144,
"Extended System ID for MST"SWITCH Foundation Learning Guide (v6 -
642-842), Page 145-150, "Configuring MST"Configuring MSTP: 3560
Software Configuration
Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swmstp.htmlAlso
see Cisco.Com "VTPv3 and MST: Catalyst 6500 Series Switches":
http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/solution_guide_c78_508010.htmlConfiguring
MSTP: Configuring Path Cost: 3560 Software Configuration
Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swmstp.html#wp1039394Configuring
MSTP: Configuring Port Priority: 3560 Software Configuration
Guide:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swmstp.html#wp1039280See
Cisco.Com "Configuration example to migrate Spanning Tree from
PVST+ to
MST":http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/72844-MST.htmlAlso
see Cisco.Com "Understanding Multiple Spanning Tree
Protocol":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24248-147.html
-
Cisco.Com "Understanding Multiple Spanning Tree
Protocol":http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24248-147.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 195-197,
"Inter_VLAN Configuration with External Router"SWITCH Foundation
Learning Guide (v6 - 642-813), Pages 186-189, "Inter-VLAN Routing
Using an External Router (Router-on-a-Stick)"SWITCH Foundation
Learning Guide (v6 - 642-813), Pages 189-190, "External Router:
Advantages and Disadvantages"SWITCH Foundation Learning Guide (v6 -
642-813), Pages 190-192, "Inter-VLAN Routing Using Switch Virtual
Interfaces"SWITCH Foundation Learning Guide (v6 - 642-813), Page
192, "SVI: Advantages and Disadvantages"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 193,
"Routed Port: Advantages and Disadvantages"This section is a
step-by-step walk through of configuring InterVLAN Routing using
SVIs and Routed Ports, Closest example is SWITCH FLG v6 Pages
197-199This section is a step-by-step walk through of configuring
InterVLAN Routing using SVIs and Routed Ports, Closest example is
SWITCH FLG v6 Pages 197-199This section is a step-by-step walk
through of configuring InterVLAN Routing using SVIs and Routed
Ports, Closest example is SWITCH FLG v6 Pages 197-199SWITCH
Foundation Learning Guide (v6 - 642-813), Pages 199-200, "SVI
Autostate"SWITCH Foundation Learning Guide (v6 - 642-813), Pages
197-198, "Inter-VLAN Configuration with SVI: Implementation
Plan"SWITCH Foundation Learning Guide (v6 - 642-813), Pages
204-206, " Troubleshooting Inter-VLAN Problems"
Configuring EtherChannels: 3560 Software Configuration Guide:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/15-0_2_se/configuration/guide/scg3560/swethchl.htmlSWITCH
Foundation Learning Guide (v6 - 642-813), Pages 206-208,
"Configuration of Layer 3 EtherChannel"SWITCH Foundation Learning
Guide (v6 - 642-813), Pages 208-210, "Routing Protocol
Configuration" and "Verifying Routing Protocol"
chapter 12 "Configuring DHCP", pages 297-299, "Configuring DHCP
to support IPv6"Also - Cisco Documentation - IOS IPv6 Configuration
Guide for IOS release
15.2M&Thttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/15-SWITCH
Foundation Learning Guide (v6 - 642-813), Pages 288 , Chapter 5:
Implementing High Availability and Redundancy in a Campus Network,
"First Hop Redunandcy Protocols
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 244- ,
Chapter 5 Implementing High Availability and Redundancy in a Campus
Network"
-
SWITCH Foundation Learning Guide (v6 - 642-813), Page
309-310,"VRRP"
SWITCH Foundation Learning Guide (v6 - 642-813), Page
309-310,"VRRP"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 296, "HSRP
Active Router and Spanning Tree Topology"SWITCH Foundation Learning
Guide (v6 - 642-813), Page 296, "Configuring HSRP" SWITCH
Foundation Learning Guide (v6 - 642-813), Page 296, "Configuring
HSRP"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 302-304
"HSRP Interface Tracking, HSRP Object Tracking, HSRP and IP SLA
Tracking"SWITCH Foundation Learning Guide (v6 - 642-813), Pages
302-304 "HSRP Interface Tracking, HSRP Object Tracking, HSRP and IP
SLA Tracking"SWITCH Foundation Learning Guide (v6 - 642-813), Pages
302-304 "HSRP Interface Tracking, HSRP Object Tracking, HSRP and IP
SLA Tracking"SWITCH Foundation Learning Guide (v6 - 642-813), Page
298, "HSRP Authentication"SWITCH Foundation Learning Guide (v6 -
642-813), Page 299-301, "HSRP Timers Considerations and
Configuration"SWITCH Foundation Learning Guide (v6 - 642-813), Page
301, "HSRP Versions"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 312-315,
" Configure VRRP"
VRRP
Authenticationhttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/12-4/fhp-12-4-book/fhp-vrrp.htmlVRRP
Trackinghttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/12-4/fhp-12-4-book/fhp-vrrp.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 316,
"Table 5-11, Comparison between HSRP and GLBP"
Configuring
GLBPhttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp-glbp.htmlConfiguring
GLBPhttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp-glbp.htmlConfiguring
GLBPhttp://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp-glbp.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 262-272,
Chapter 5: Implementing High Availability, " Implementing Network
Monitoring"
Compare RADUIS and
TACACS+http://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13838-10.html
-
Not covered in detail in CCNP:SWITCH v.6.0
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 387-390,
" Security Using IEEE 802.1x Port-Based Authentication"
"What's new in Version
4"http://www.ntp.org/ntpfaq/NTP-s-def.htm#Q-DEF-OV-V4NEWSImplementing
NTPv4 in
IPv6http://www.cisco.com/c/en/us/td/docs/ios/ipv6/configuration/guide/12_4t/ipv6_12_4t_book/ip6-ntpv4.html
IEEE Standard for A Precison Clock Synchronization Protocol
http://www.nist.gov/el/isd/ieee/ieee1588.cfmSecuring Simple Network
Management Protocol, Document ID: 20370,
www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094489.shtml
Verifying
SNMPv3http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe-3se/3850/snmp-xe-3se-3850-book/nm-snmp-snmpv3.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 373-376,
" Neighbor Discovery Protocols"
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swudld.html
-
Not covered in CCNP:SWITCH v.6.0
Not covered in CCNP:SWITCH v.6.0
LoopGuard versus
UDLDhttp://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10596-84.htmlSWITCH
Foundation Learning Guide (v6 - 642-813), Pages 491-493, "Power
over Ethernet"
Consult www.cisco.com product configuration guide for guidance
on SDM Configuration for a specific platform.
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 398-410,
Chapter 6: Securing the Campus Infrastructure " Troubleshooting
Performance and Connectivity"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 402,
Chapter 6: Securing the Campus Infrastructure "Monitoring
Performance with SPAN and VSPAN "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 404-408,
Chapter 6: Securing the Campus Infrastructure "Monitoring
Performance RSPAN "SWITCH Foundation Learning Guide (v6 - 642-813),
Pages 273-280 , Chapter 5: Implementing High Availability and
Redundancy in a Campus Network "IP SLA"
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swipsla.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 259-260 ,
Chapter 5: Implmenting High Availability, "StackWise Access
Switches"
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/15-1-2/XE_340/configuration/guide/config/vss.html#wp1060337http://www.cisco.com/c/dam/en/us/products/collateral/interfaces-modules/network-modules/white_paper_c11_429338.pdf
-
SWITCH Foundation Learning Guide (v6 - 642-813), Pages280 ,
Chapter 5: Implementing High Availability and Redundancy in a
Campus Network "Implementing Redundant Supervisor Engines in
Catalyst Switches"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 281 ,
Chapter 5: Implementing High Availability and Redundancy in a
Campus Network, "Route Process Redundancy"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 284 ,
Chapter 5: Implementing High Availability and Redundancy in a
Campus Network, "Stateful Switchover (SSO)"
SWITCH Foundation Learning Guide (v6 - 642-813), Page 284 ,
Chapter 5: Implementing High Availability and Redundancy in a
Campus Network, "Stateful Switchover (SSO)"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 333-416
,Chapter 6: Securing the Campus Infrastructure
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 333-416
,Chapter 6: Securing the Campus Infrastructure " Switch Security
Fundamentals" SWITCH Foundation Learning Guide (v6 - 642-813),
Pages 390-397 , "Switch Security Considerations. "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 336
"Unauthorized Access by Rogue Devices" SWITCH Foundation Learning
Guide (v6 - 642-813), Pages 362 "Table 6-1 Switch Security Attacks
and Mitigation Steps" SWITCH Foundation Learning Guide (v6 -
642-813), Pages 338 "Understanding and Protecting Against MAC Layer
Attack" SWITCH Foundation Learning Guide (v6 - 642-813), Pages 341
"Port Security" SWITCH Foundation Learning Guide (v6 - 642-813),
Pages 343 "Port Security"
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 352 "VLAN
Access Control Lists" Configuring Port Based Traffic Control:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swtrafc.html
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 356 "DHCP
Spoofing Attack" SWITCH Foundation Learning Guide (v6 - 642-813),
Pages 358 "DHCP Snooping " SWITCH Foundation Learning Guide (v6 -
642-813), Pages 359 "DHCP Snooping "
-
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 368 "IP
Spoofing and IP Source Guard "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 361 "Arp
Spoofing Attack " SWITCH Foundation Learning Guide (v6 - 642-813),
Pages 362 "Arp Spoofing Attack "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 350 "VLAN
Hopping "
SWITCH Foundation Learning Guide (v6 - 642-813), Pages 351-352
"Mitigating Against VLAN Hopping"SWITCH Foundation Learning Guide
(v6 - 642-813), Pages 352 "VLAN Access Control Lists" SWITCH
Foundation Learning Guide (v6 - 642-813), Pages 352-355 "VLAN
Access Control Lists" SWITCH Foundation Learning Guide (v6 -
642-813), Pages 352-355 "VLAN Access Control Lists" SWITCH
Foundation Learning Guide (v6 - 642-813), Chapter 2: Implementing
VLANs in Campus Networks, Page 87-97, "Private VLANs"
SWITCH Foundation Learning Guide (v6 - 642-813), Chapter 2:
Implementing VLANs in Campus Networks, Page 121, "Port Protected
Feature"
Lesson Map