Cisco 813-RF - 813 Router Spécifications

Naviguer en ligne ou télécharger Spécifications pour Mise en réseau Cisco 813-RF - 813 Router. Cisco 813-RF - 813 Router Specifications Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 112
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
CCNP SWITCH 642-813
Quick Reference
Chapter 1:
Campus Network Design........................4
Chapter 2:
VLAN Implementation...........................12
Chapter 3:
Spanning Tree........................................29
Chapter 4:
InterVLAN Routing ................................49
Chapter 5:
Implementing High Availability............59
Chapter 6:
First Hop Redundancy ..........................72
Chapter 7:
Campus Network Security...................79
Chapter 8:
Voice and Video
in a Campus Network ...........................91
Chapter 9:
Wireless LANs
in a Campus Network .........................102
Denise Donohue
ciscopress.com
9781587140112.qxd 11/23/09 11:34 AM Page 1
Vue de la page 0
1 2 3 4 5 6 ... 111 112

Résumé du contenu

Page 1 - Quick Reference

CCNP SWITCH 642-813Quick ReferenceChapter 1:Campus Network Design...4Chapter 2:VLAN Implementation...12Ch

Page 2 - About the Technical Editor

CHAPTER 1Campus Network DesignPlanning a Network ImplementationIt is important to use a structured approach to planning and implementing any network c

Page 3 - Icons Used

CHAPTER 8Voice and Video in a Campus NetworkUsing AutoQoSWhen AutoQoS is enabled, the switch configures its interfaces based on a best-practices templ

Page 4 - Chapter 1

CHAPTER 8Voice and Video in a Campus NetworkVideo over IPVideo traffic roughly falls into one of three categories: many-to-many, many-to-few, and few-

Page 5 - The Core Layer

CHAPTER 9Wireless LANs in a Campus NetworkChapter 9Wireless LANs in a Campus NetworkWireless LANs (WLAN) transmit and receive data using radio or infr

Page 6 - Medium Campus Design

CHAPTER 9Wireless LANs in a Campus NetworkThe Cisco Compatible Extensions Program tests other vendors’ devices for compatibility with Cisco wireless p

Page 7 - Data Center Design

CHAPTER 9Wireless LANs in a Campus NetworkService Set Identifiers (SSID)An SSID maps to a VLAN and can be used to segment users into groups requiring

Page 8 - Network Traffic Flow

CHAPTER 9Wireless LANs in a Campus NetworkClient ConnectivityClients associate with an access point as follows:Access points send out beacons announci

Page 9

CHAPTER 9Wireless LANs in a Campus NetworkCisco Wireless Network ComponentsCisco supports two types of wireless solutions: one using autonomous access

Page 10 - FIGURE 1-3

CHAPTER 9Wireless LANs in a Campus NetworkLightweight Access PointsLightweight APs divide the 802.11 processing between the AP and a Cisco Wireless LA

Page 11

CHAPTER 9Wireless LANs in a Campus NetworkStep 3. The WLCs respond with an LWAPP or CAPWAP Discovery Response that includes the number of APscurrently

Page 12 - Chapter 2

CHAPTER 9Wireless LANs in a Campus NetworkWireless LAN ControllersCisco WLAN controllers can be either an appliance, a module, or integrated into a 37

Page 13 - FIGURE 2-2

CHAPTER 1Campus Network DesignNetwork engineers at the CCNP level will likely be involved at the implementation and following phases. They can alsopar

Page 14 - VLAN Planning

CHAPTER 9Wireless LANs in a Campus NetworkIntegrating Wireless into the LANThis section covers configuring your switches for wireless APs and controll

Page 15 - Verifying VLAN Configuration

CHAPTER 9Wireless LANs in a Campus NetworkPlanning for a Wireless ImplementationIn planning a wireless implementation, first gather requirements. Some

Page 16

CCNP SWITCH Quick Reference Denise Donohue Copyright © 2010 Pearson Education, Inc.Published by:Cisco Press800 East 96th StreetIndianapolis, Indiana 4

Page 17 - VLAN Trunking

CHAPTER 2VLAN ImplementationChapter 2VLAN ImplementationVLANs are used to break large campus networks into smaller pieces. The benefit of this is to m

Page 18 - Configuring a Trunk Link

CHAPTER 2VLAN Implementation[ 13 ]© 2010 Pearson Education, Inc. All rights reserved. This publication is protected by copyright. Please see page 112

Page 19 - VLANs Allowed on the Trunk

CHAPTER 2VLAN ImplementationWhen planning a VLAN structure, consider traffic flows and link sizing. Take into account the entire traffic pattern ofapp

Page 20 - VLAN Trunking Protocol

CHAPTER 2VLAN ImplementationCreating a VLAN and Assigning PortsVLANs must be created before they can be used. Creating VLANs is easy—in global configu

Page 21 - VTP Switch Roles

CHAPTER 2VLAN ImplementationOther verification commands include:n show running-config interface interface no: Use the following to verify the VLAN mem

Page 22 - Configuring VTP

CHAPTER 2VLAN ImplementationOperational Trunking Encapsulation: nativeNegotiation of Trunking: OnAccess Mode VLAN: 1 (default)Trunking Native Mode VLA

Page 23 - Verifying and Monitoring VTP

CHAPTER 2VLAN Implementationin either the ISL encapsulation or the 802.1Q tag. The switch on the other end of the trunk removes the ISL or 802.1Qinfor

Page 24 - EtherChannels

CHAPTER 2VLAN ImplementationConfigure a port for trunking at the interface configuration mode:(config-if)#switchport mode {dynamic {auto | desirable}

Page 25 - Configuring an EtherChannel

About the AuthorDenise Donohue, CCIE No. 9566, is a senior solutions architect for ePlus Technology. She consults with companies todesign updates or a

Page 26 - Verifying an EtherChannel

CHAPTER 2VLAN ImplementationUsing the trunk keyword with the show interfaces command gives information about the trunk link:# show interfaces fastethe

Page 27 - Troubleshooting VLAN Issues

CHAPTER 2VLAN ImplementationVTP works by using Configuration Revision numbers and VTP advertisements:n All switches send out VTP advertisements every

Page 28 - Troubleshooting VTP

CHAPTER 2VLAN ImplementationThe two versions of VTP are Version 1 and Version 2. To use Version 2, all switches in the domain must be capable ofusing

Page 29 - Chapter 3

CHAPTER 2VLAN ImplementationVerifying and Monitoring VTPTo get basic information about the VTP configuration, use show vtp status. The example shows t

Page 30 - FIGURE 3-1

CHAPTER 2VLAN ImplementationEtherChannelsAn EtherChannel is a way of combining several physical links between switches into one logical connection. No

Page 31

CHAPTER 2VLAN ImplementationConfiguring an EtherChannelBasically, you should configure the logical interface and then put the physical interfaces into

Page 32 - The STP Election

CHAPTER 2VLAN ImplementationLink Aggregation Control Protocol (LACP) is an IEEE standard protocol, IEEE 802.3ad, which does the same thing.LACP modes

Page 33 - Designated Port Election

CHAPTER 2VLAN ImplementationTroubleshooting VLAN IssuesConfiguration problems can arise when user traffic must traverse several switches. The followin

Page 34 - Bridge Protocol Data Units

CHAPTER 2VLAN ImplementationTroubleshooting VTPThe following are some common things to check when troubleshooting problems with VTP:n Make sure you ar

Page 35

CHAPTER 3Spanning TreeChapter 3Spanning TreeEthernet network design balances two separate imperatives. First, Ethernet has no capacity for detecting c

Page 36 - Per-VLAN Spanning-Tree

Icons Used[ 3 ]© 2010 Pearson Education, Inc. All rights reserved. This publication is protected by copyright. Please see page 112 for more details.CC

Page 37 - Configuring Spanning Tree

CHAPTER 3Spanning TreeSpanning Tree Protocol (STP) works by selecting a root bridge and then selecting one loop-free path from the root bridgeto every

Page 38 - Rapid Spanning Tree

CHAPTER 3Spanning TreeSpanning Tree Election CriteriaSpanning Tree builds paths out from a central point along the fastest available links. It selects

Page 39 - RSTP Fast Convergence

CHAPTER 3Spanning TreeTable 3-1 Spanning Tree CostsLink Speed Previous IEEE Specification Current IEEE Specification10 Mb/s 100 100100 Mb/s 10 191 Gbp

Page 40 - Multiple Spanning Tree

CHAPTER 3Spanning TreeRoot Port ElectionThe root port is the port that leads back to the root. Continuing with Figure 3-1, when A is acknowledged as t

Page 41 - # show spanning-tree mst

CHAPTER 3Spanning TreeBridge Protocol Data Units Switches exchange Bridge Protocol Data Units (BPDU). The two types of BPDUs are Configuration and Top

Page 42 - BackboneFast

CHAPTER 3Spanning TreeTCN BPDUs are sent by a downstream switch toward the root when:n There is a link failure.n A port starts forwarding, and there i

Page 43 - BPDU Filtering

CHAPTER 3Spanning TreeSpanning Tree Port StatesWhen a port is first activated, it transitions through the following stages shown in Table 3-2.Table 3-

Page 44 - Unidirectional Link Detection

CHAPTER 3Spanning TreeConfiguring Spanning TreeTo change the STP priority value, use the following:Switch (config)# spanning-tree vlan vlan_no. priori

Page 45 - Loop Guard

CHAPTER 3Spanning TreePortfastPortfast is a Cisco-proprietary enhancement to Spanning Tree that helps speed up network convergence. It is for access(u

Page 46 - Troubleshooting STP

CHAPTER 3Spanning TreeRSTP Port RolesRSTP also defines different Spanning Tree roles for ports:n Root port: The best path to the root (same as STP)n D

Page 47 - Spanning-Tree Best Practices

CHAPTER 1Campus Network DesignChapter 1Campus Network DesignAn enterprise campus generally refers to a network in a specific geographic location. It c

Page 48 - FIGURE 3-3

CHAPTER 3Spanning Treen Link type: If you connect two switches through a point-to-point link and the local port becomes a designated port, itexchanges

Page 49 - Chapter 4

CHAPTER 3Spanning Tree(config-mst)# revision number(config-mst)# instance number vlan vlan_range(config-mst)# end# show spanning-tree mstTo be compati

Page 50

CHAPTER 3Spanning TreeUplinkFastUplinkFast is for speeding convergence when a direct link to an upstream switch fails. The switch identifies backup po

Page 51

CHAPTER 3Spanning TreeConfigure this command on all switches in the network:(config)# spanning-tree backbonefastBPDU GuardBPDU Guard prevents loops if

Page 52

CHAPTER 3Spanning TreeRoot GuardRoot Guard is meant to prevent the wrong switch from becoming the Spanning Tree root. It is enabled on ports other tha

Page 53 - MLS Interfaces

CHAPTER 3Spanning TreeTo control UDLD on a specific fiber port, use the following command:(config-if)# udld port {aggressive | disable}To reenable all

Page 54

CHAPTER 3Spanning TreeTo enable Loop Guard on a specific interface, use the following:(config-if)# spanning-tree guard loopLoop Guard automatically re

Page 55 - CEF Switching

CHAPTER 3Spanning TreeIdentifying a Bridging LoopSuspect a loop if you see the following:n You capture traffic on a link and see the same frames multi

Page 56 - FIGURE 4-1

CHAPTER 3Spanning Treen Tune STP using the tools detailed in this section.n Enable UDLD aggressive mode on all fiber interfaces.n Design STP domains t

Page 57

CHAPTER 4InterVLAN RoutingChapter 4InterVLAN RoutingVLANs divide the network into smaller broadcast domains but also prohibit communication between do

Page 58 - # show adjacency

CHAPTER 1Campus Network Designn Distribution: Aggregation point for access switches. Provides availability, QoS, fast path recovery, and load balancin

Page 59 - Chapter 5

CHAPTER 4InterVLAN Routingencapsulation dot1Q 20ip address 10.1.20.1 255.255.255.0!interface FastEthernet0/1.99description Native VLANencapsulation do

Page 60 - Technology

CHAPTER 4InterVLAN RoutingInput1. Receive frame2. Verify frame integrity3. Apply inbound VLAN ACL (VLAN Access Control List)4. Look up destination MAC

Page 61 - Processes

CHAPTER 4InterVLAN RoutingRouting1. Apply input ACL2. Switch if entry is in CEF cache3. Identify exit interface and next-hop address using routing tab

Page 62

CHAPTER 4InterVLAN RoutingIn comparison, Multilayer Switching (MLS) uses aa Ternary Content Addressable Memory (TCAM) table to store infor-mation need

Page 63 - Fast Failover

CHAPTER 4InterVLAN RoutingAn SVI is considered “up” as long as at least one port in its associated VLAN is active and forwarding. If all ports in theV

Page 64 - Optimizing Redundancy

CHAPTER 4InterVLAN RoutingTo verify your configuration, use the commands show ip interface brief, show interface, or show running-config inter-face in

Page 65 - Designing for Redundancy

CHAPTER 4InterVLAN Routingn Separates control plane hardware from data plane hardware.n Controls plane runs in software and builds FIB and adjacency t

Page 66 - FIGURE 5-2

CHAPTER 4InterVLAN Routingn 802.3 (IPX) or other unsupported encapsulation typesn Packets with an expiring TTLn Packets that must be fragmentedConfigu

Page 67 - FIGURE 5-4

CHAPTER 4InterVLAN RoutingTroubleshoot CEF drops with the following:# show cef dropTroubleshoot CEF adjacencies with the following:# show adjacency[ 5

Page 68

CHAPTER 5Implementing High AvailabilityChapter 5Implementing High AvailabilityA highly available network is the goal of every network engineer. Having

Page 69

CHAPTER 1Campus Network DesignSmall Campus DesignIn a small campus, the core and distribution can be combined into one layer. Small is defined as fewe

Page 70

CHAPTER 5Implementing High AvailabilityTechnologySome of the technologies found in Cisco routers and Layer 3 switches enhance availability by providin

Page 71

CHAPTER 5Implementing High Availabilityn Communication and documentation: There should be good communication between teams responsible for thenetwork,

Page 72 - Chapter 6

CHAPTER 5Implementing High Availabilityn Disaster recovery and business continuity plansn Evaluating the security impact of a proposed changeToolsA we

Page 73 - HSRP States

CHAPTER 5Implementing High AvailabilityNetwork Level ResiliencyRedundant links were discussed in Chapter 2. STP blocks a redundant link by default so

Page 74 - Configuring HSRP

CHAPTER 5Implementing High AvailabilityOptimizing RedundancyYou should be aware that redundancy does not always equal resiliency. Too much redundancy

Page 75

CHAPTER 5Implementing High AvailabilityDesigning for RedundancyFigure 5-1 shows where you would typically use redundancy within a campus network. Acce

Page 76

CHAPTER 5Implementing High AvailabilityThere must be a physical link between distribution switches, and it should be a L2 trunk. Without that link, an

Page 77

CHAPTER 5Implementing High AvailabilityIn Figure 5-4 the access switches are L3. This gives the faster convergence and is easiest to implement. All li

Page 78

CHAPTER 5Implementing High AvailabilityUsing Nonchassis Based Access SwitchesUsing more than one stand-alone switch, such as the Cisco 3560 or 3750, i

Page 79 - Chapter 7

CHAPTER 5Implementing High AvailabilitySyslogCisco devices produce system logging (or syslog) messages that can be output to the device console, VTY c

Page 80 - MAC Address-Based Attacks

CHAPTER 1Campus Network DesignData Center DesignThe core layer connects end users to the data center devices. The data center segment of a campus can

Page 81

CHAPTER 5Implementing High AvailabilitySNMPAn SNMP manager collects information from SNMP agents residing on network devices, either through regular p

Page 82 - Port-Based Authentication

CHAPTER 5Implementing High Availabilitycalled a responder. IP SLA probes can simulate various types of traffic, such as HTTP, FTP, DHCP, UDP jitter, U

Page 83 - VLAN-Based Attacks

CHAPTER 6First Hop RedundancyChapter 6First Hop RedundancySpecifying a default gateway leads to a single point of failure. Proxy Address Resolution Pr

Page 84 - 802.1Q Double-Tagging

CHAPTER 6First Hop RedundancyThe Active router forwards traffic. The Standby is backup. The standby monitors periodic hellos (multicast to 224.0.0.2,U

Page 85

CHAPTER 6First Hop RedundancyConfiguring HSRPTo begin configuring HSRP, use the standby group-number ip virtual-IP-address command in interface config

Page 86 - Private VLANs

CHAPTER 6First Hop RedundancyTracking an interface can trigger an election if the active router is still up but a critical interface (such as the one

Page 87 - Protected Ports

CHAPTER 6First Hop RedundancyThe VRRP Master router forwards traffic. The master is chosen because it owns the real address, or it has the highestpri

Page 88 - Spoof Attacks

CHAPTER 6First Hop RedundancyTo change the timers on the backup routers, use the following command because they hear the hellos from the master:Router

Page 89 - Securing Your Switch

CHAPTER 6First Hop RedundancyThe actual router used by a host is its Active Virtual Forwarder (AVF). GLBP group members multicast hellos every 3second

Page 90

CHAPTER 7Campus Network SecurityChapter 7Campus Network SecurityAttention has traditionally been paid to network perimeter security, such as firewall,

Page 91 - Chapter 8

CHAPTER 1Campus Network DesignNetwork Traffic FlowThe need for a core layer and the devices chosen for the core also depend on the type of network tra

Page 92 - VoIP in a Campus Network

CHAPTER 7Campus Network SecurityMAC Address-Based AttacksCommon MAC address-based attacks rely on flooding the CAM table and can be mitigated by using

Page 93 - FIGURE 8-1

CHAPTER 7Campus Network SecurityTABLE 7-1 Port Security CommandsCommand Descriptionswitchport port-security Enables port security on that interface.sw

Page 94 - Voice VLANs

CHAPTER 7Campus Network SecurityMaximum MAC Addresses : 2Total MAC Addresses : 0Configured MAC Addresses : 0Sticky MAC Addresses : 0Last

Page 95 - QoS for VoIP

CHAPTER 7Campus Network SecurityTable 7-2 Configuring 802.1x Port AuthenticationCommand Description(config-if)#dot1x port- control Enables 802.1x auth

Page 96 - QoS Actions

CHAPTER 7Campus Network Security802.1Q Double-TaggingA double-tagging attack is possible because 802.1Q trunking does not tag frames from the native V

Page 97 - DSCP Values

CHAPTER 7Campus Network SecurityVACLsCisco switches support of various kinds of ACLs:n Traditional Router ACL (RACL)n QoS ACLn VA C LVLAN access contr

Page 98 - Trust Boundaries

CHAPTER 7Campus Network SecurityPrivate VLANsPrivate VLANs (PVLAN) enable large companies or service providers to isolate users into separate multiacc

Page 99 - Manual Configuration

CHAPTER 7Campus Network SecurityTable 7-3 Configuring Private VLANsCommand Descriptionprivate-vlan association Associates secondary VLANs with the pri

Page 100 - Using AutoQoS

CHAPTER 7Campus Network SecuritySpoof AttacksSpoof attacks include DHCP spoofing, MAC address spoofing, and ARP spoofing.DHCP SpoofingA DHCP spoofing

Page 101 - Video over IP

CHAPTER 7Campus Network SecurityEnable IP Source Guard for both IP and MAC addresses on host access interfaces with the command ip verify sourceport-s

Page 102 - Chapter 9

CHAPTER 1Campus Network Designn Client-Enterprise Edge applications are located on servers at the WAN edge, reachable from outside the company.These c

Page 103

CHAPTER 7Campus Network Securityn Use SSH instead of Telnet.n Physically secure access to the device.n Use banners that warn against unauthorized acce

Page 104 - WLAN Topologies

CHAPTER 8Voice and Video in a Campus NetworkChapter 8Voice and Video in a Campus NetworkVoice over IP (VoIP) has become common in the business world,

Page 105 - Client Connectivity

CHAPTER 8Voice and Video in a Campus NetworkData requirements typically include high bandwidth, but delay and jitter are not crucial. A highly availab

Page 106 - Autonomous (Stand-alone) APs

CHAPTER 8Voice and Video in a Campus NetworkVoIP traffic consists of two types: voice bearer and call control signaling. Voice bearer traffic is carri

Page 107 - Lightweight Access Points

CHAPTER 8Voice and Video in a Campus Networkn Electrical power for the IP phones: Use either PoE from Catalyst switch or power inline module, or a pow

Page 108

CHAPTER 8Voice and Video in a Campus NetworkCisco IP phones have a small internal switch that places an 802.1q tag on voice traffic and marks the Clas

Page 109 - Wireless LAN Controllers

CHAPTER 8Voice and Video in a Campus Networkn Allows service to be tailored to network needsn Allows mission-critical applications to share the networ

Page 110 - Switch Configuration

CHAPTER 8Voice and Video in a Campus Networkn Dropping: Normally interface queues accept packets until they are full and then drop everything after th

Page 111

CHAPTER 8Voice and Video in a Campus NetworkVoice bearer traffic uses an Expedited Forwarding value of DSCP 46 to give it higher priority within the n

Page 112 - CCNP SWITCH Quick Reference

CHAPTER 8Voice and Video in a Campus Network4. Fast Convergency: To enhance high availability, tune the routing and HSRP/VRRP/GLBP timers.5. Test Plan

Commentaires sur ces manuels

Pas de commentaire