CCNP Building Multilayer Switched Networks (BCMSN 642-812) Lab Portfolio (Cisco Networking Academy)

CCNP Building Multilayer Switched Networks (BCMSN 642-812) Lab Portfolio (Cisco Networking Academy)

3.6 (5 ratings by Goodreads)
By (author)  , By (author)  , By (author)  , By (author) 

List price: US$59.99

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

CCNP Building Multilayer Switched Networks (BCMSN 642-812) Lab Portfolio provides you with opportunities for hands-on practice to master the technologies necessary to design, implement, operate, and troubleshoot multilayer switched networks. The labs reinforce your understanding of how to install, configure, monitor, and troubleshoot network infrastructure equipment to deploy state-of-the-art campus LANs. The book focuses on the selection and implementation of the appropriate Cisco (R) IOS (R) services to build reliable, scalable, multilayer-switched LANs. Other topic areas of the course include VLANs, Spanning Tree Protocol, wireless client access, minimizing service loss, and minimizing data theft in a campus network. Those preparing for the Building Multilayer Switched Networks (BCMSN 642-812) certification exam should work through this book cover-to-cover. If you need to quickly review configuration examples, you can go directly to the relevant chapter. CCNPBuildingMultilayer Switched Networks (BCMSN 642-812) Lab Portfolio includes19 Labs built to support v5 of the Building Multilayer Switched Networks course within the Cisco Networking Academy curriculum providing ample opportunity to practice. 2 Challenge and Troubleshooting Labs have been added to the core curriculum to test your mastery of the topics. 2 Case Studies to give you a taste of what is involved in a fully functioning switching network covering all the technologies taught in this course. Even if you do not have the actual equipment to configure these more complex topologies, it is worth reading through these labs to expand your thinking into more complex networking solutions. David Kotfila, CCNP (R), CCAI, is the director of the Cisco Networking Academy at Rensselaer Polytechnic Institute (RPI), Troy, New York. Joshua Moorhouse, CCNP, recently graduated from Rensselaer Polytechnic Institute with a bachelor of science in computer science, where he also worked as a teaching assistant in the Cisco Networking Academy. He currently works as a network engineer at Factset Research Systems. Christian M. Price Sr., CCNP, is an instructor in the Cisco Networking Academy at Rensselaer Polytechnic Institute in Troy, New York. Ross Wolfson, CCIE (R) No. 16696, recently graduated from Rensselaer Polytechnic Institute with a bachelor of science in computer science. He currently works as a network engineer at Factset Research Systems. Use this Lab Portfolio with: CCNP BCMSN Official Exam Certification GuideFourth EditionISBN-10: 1-58720-171-2ISBN-13: 978-1-58720-171-4 CCNP BCMSN Portable Command GuideISBN-10: 158-720-188-7ISBN-13: 978-158720-188-2 This book is part of the Cisco Networking Academy Series from Cisco Press (R). Books in this series support and complement the Cisco Networking Academy curriculum.show more

Product details

  • Paperback | 240 pages
  • 215.9 x 274.32 x 15.24mm | 566.99g
  • Pearson Education (US)
  • Cisco Press
  • Indianapolis, United States
  • English
  • ill
  • 1587132141
  • 9781587132148
  • 1,311,487

About David Kotfila

David Kotfila, CCNP, CCAI, is the director of the Cisco Academy at Rensselaer Polytechnic Institute (RPI), Troy, New York. Under his direction, 350 students have received their CCNA, 150 students have received their CCNP, and 8 students have obtained their CCIE. David is a consultant for Cisco working as a member of the CCNP assessment group. His team at RPI has authored the four new CCNP lab books for the Academy program. David has served on the National Advisory Council for the Academy program for four years. Previously, he was the senior training manager at PSINet, a Tier 1 global ISP. When David is not staring at his beautiful wife Kate or talking with his two wonderful children, Chris and Charis, he likes to kayak, hike in the mountains, and lift weights. Joshua Moorhouse, CCNP, recently graduated from Rensselaer Polytechnic Institute with a BS in computer science. While there, he also worked as a teaching assistant in the Cisco Networking Academy. He currently works as a network engineer at Factset Research Systems in Norwalk, Connecticut. Josh enjoys spending time with his wife Laura, his family, and friends. Christian M. Price Sr., CCNP, attended Hudson Valley Community College in Troy, New York, where he studied computer information systems. From 1997 to 2001, he worked for PSINet, one of the first Internet service providers and a major player in the commercialization of the Internet. Christian worked as a technical project manager with the Carrier and ISP Services group during his time at PSINet. He currently works with a credit union focusing on LAN/WAN design and implementation as well as implementation of a VoIP infrastructure for the organization. Christian is also an instructor in the Cisco Academy at Rensselaer Polytechnic Institute in Troy, New York. He lives with his loving wife and children in Grafton, New York. Ross G. Wolfson, CCIE No. 16696, recently graduated from Rensselaer Polytechnic Institute (RPI) with a BS in computer science. He currently works as a network engineer at Factset Research Systems. Ross enjoys spending time with his friends, running, and biking.show more

Table of contents

Chapter 1 Network Requirements 1Lab 1-1: Lab Configuration Guide 1Hardware and Software 2Chapter 6: Wireless LANs 3Chapter 2 Defining VLANs 5Lab 2-0a: Clearing an Isolated Switch (2.6.1) 5Step 1 Getting Connected 5Step 2 Deleting vlan.dat 5Step 3 Erasing the startup-config File 6Step 4 Reloading 6Step 5 Ready for Configuration 9Lab 2-0b: Clearing a Switch Connected to a Larger Network (2.6.1) 10Step 1 Clearing an Isolated Switch 10Step 2 Deleting vlan.dat 10Step 3 Erasing the startup-config File 10Step 4 Relearning VLANs from a Server 11Step 5 Eliminating Relearned VLANs 12Step 6 VTP Mode Transparent 13Lab 2-1: Catalyst 2960 and 3560 Series Static VLANs, VLAN Trunking, andVTP Domain and Modes (2.6.2) 14Scenario: VLAN Trunking and Domains 14Step 1 Preparing the Switch 14Step 2 VLAN 1 15Step 3 show vlan 15Step 4 VTP Modes 17Step 5 VTP Domains 18Step 6 Dynamic Auto Trunking 19Step 7 show interface Commands 21Step 8 Switchport Mode Commands 23Step 9 show vtp status 25Step 10 VLAN Database 26Step 11 Switchport Access VLAN 28Step 12 Naming VLANs 29Step 13 Preparation for the Next Lab 30Chapter 3 Implementing Spanning Tree 31Lab 3-1: Spanning Tree Protocol (STP) Default Behavior (3.5.1) 31Scenario: How Spanning Tree Prevents Loops 31Step 1 Basic Configurations 31Step 2 BPDUs 32Step 3 show spanning tree 32Step 4 Diagraming Spanning Tree 36Challenge: A New Root for Spanning Tree 36Lab 3-2: Modifying Default Spanning Tree Behavior (3.5.2) 37Scenario: Logically Removing Bridging Loops 37Step 1 Deleting vlan.dat 37Step 2 Verifying the Root Bridge 37Step 3 Changing the Primary and Secondary Root 40Step 4 Changing Forwarding and Blocking Ports 42Step 5 PortFast 44Step 6 Modifying Port Costs 46Lab 3-3: Per-VLAN Spanning Tree Behavior (3.5.3) 49Scenario: Configuring Spanning Tree Differently for Different VLANs 49Step 1 Basic Preparation 49Step 2 Setting up VTP Domains 49Step 3 Modifying Spanning Tree on a per-VLAN Basis 52Step 4 RSTP 58Challenge: Spanning Tree Root Primary 60Lab 3-4: Multiple Spanning Tree (3.5.4) 62Scenario: Configuring Multiple Spanning Tree 62Step 1 Basic Preparation 62Step 2 VTP Domain Setup 62Step 3 Verifying 11 Instances of Spanning Tree 63Step 4 spanning-tree mode mst 66Step 5 Grouping VLANs Using MST 67Challenge: Modifying per-instance MST Attributes 70Lab 3-5: Configuring EtherChannel (3.5.5) 72Scenario: Bundling Redundant Links into One Logical Link 72Step 1 Basic Preparation 72Step 2 channel group mode desirable 72Step 3 channel group mode active 75Step 4 Configuring EtherChannel on Layer 3 Connections 75Step 5 Traffic Load Balancing 76Challenge: Logically Aggregating Additional Redundant Links 77Chapter 4 Implementing Inter-VLAN Routing 79Lab 4-1: Inter-VLAN Routing with an External Router (4.4.1) 79Scenario: A Cost Effective Solution to Segment a Network into MultipleBroadcast Domains 79Step 1 Basic Preparation 79Step 2 Configuring up the Gateway and ISP Router 79Step 3 ip default-gateway 80Step 4 Verify Existing VLANs 81Step 5 Configuring Trunking and EtherChannel 82Step 6 Configuring the VTP Domain 83Step 7 Configuring Switch Access Ports for Hosts 83Step 8 Trunking with the External Router 83Step 9 Trunking for VLANs 1, 100, and 200 84Step 10 Verify inter-VLAN Routing 86Lab 4-2: Inter-VLAN Routing with an Internal Route Processor and MonitoringCEF Functions (4.4.2) 87Scenario: Configuring Switched Virtual Interfaces to Route BetweenVLANs 87Step 1 Basic Preparation 87Step 2 Basic Configuration 87Step 3 Configuring Trunks and EtherChannel 89Step 4 Changing the VTP Mode 91Step 5 Creating the VTP Domain 92Step 6 Configuring the Host Ports 92Step 7 Creating Layer 3 VLAN interfaces 93Step 8 Verifying inter-VLAN Routing 94Step 9 CEF 94Chapter 5 Implementing High Availability in a Campus Environment 99Lab 5-1: Hot Standby Router Protocol (5.4.1) 99Scenario: Redundant, Fault-tolerant Routing to the Internal Network 99Step 1 Basic Preparation 99Step 2 Basic Configuration 99Step 3 Configuring Trunks and EtherChannel 101Step 4 Changing the VTP Mode 104Step 5 Creating the VTP Domain 105Step 6 Configuring the Host Ports 105Step 7 HSRP Configuration 106Step 8 show standby 108Step 9 Verify Connectivity Between VLANs 112Step 10 Verify HSRP 112Lab 5-2: HSRP Troubleshooting (5.4.2) 113Initial Configurations 113Lab 5-3: Gateway Load Balancing Protocol 114Step 1 Basic Preparation 114Step 2 Basic Configuration 114Step 3 GLBP Configuration and Verification 114Step 4 Adjusting the Weight to Prefer Certain Routers 120Chapter 6 Wireless LANs 125Option 1: Using the External WLAN Controller 125Option 2: Using the WLAN Controller Network Module 127Lab 6-1a: Configuring an External WLAN Controller (6.7.1a) 129Step 1 Basic Preparation 130Step 2 Basic Configuration 130Step 3 Configuring the Switched Virtual Interfaces 132Step 4 DHCP 132Step 5 PortFast 133Step 6 Configuring the Host and Host Port 134Step 7 Enable and Verify Routing 136Step 8 WLAN Controller Wizard 136Step 9 Additional WLAN Controller Configuration 138Lab 6-1b: Configuring a WLAN Controller Installed in a Router (6.7.1b) 139Step 1 Basic Preparation 139Step 2 VLAN and VTP Domain Configuration 139Step 3 Subinterfaces 140Step 4 DHCP 141Step 5 PortFast 142Step 6 Configuring the Host and Host Port 142Step 7 Verify Routing 144Step 8 WLAN Controller Wizard 145Step 9 Additional WLAN Controller Configuration 147Lab 6-2: Configuring a WLAN Controller via the Web Interface (6.7.2) 149Step 1 Load Existing Configurations from Previous Lab 150Step 2 Using the Web Interface for Configuration 150Step 3 Creating Logical Interfaces 152Step 4 Configuring WLANs That Correspond to the VLANs 155Lab 6-3: Configuring a Wireless Client (6.7.3) 158Step 1 Install Cisco Aironet Wireless Card Software 159Step 2 Inserting the Cisco 802.11 a/b/g Wireless Adapter 163Step 3 Verify Status of Installation 166Chapter 7 Configuring Campus Switches to Support Voice 169Lab 7-1: Configuring Switches for IP Telephony Support (7.3.1) 169Scenario: Preparing the Switching Network to Support Voice 169Step 1 Basic Preparation 170Step 2 Basic Configuration 170Step 3 Configure the Trunks and EtherChannel 171Step 4 Changing the VTP Mode 173Step 5 Creating the VTP Domain 174Step 6 HSRP 174Step 7 Auto QoS Configuration 176Step 8 Verify Auto QoS 177Step 9 Configure the Distribution Layer to Trust CoS 177Step 10 Verify Auto QoS at the Distribution Layer 178Step 11 mls qos cos 179Chapter 8 Minimizing Service Loss and Data Theft in a Campus Network 181Lab 8-1: Securing the Layer 2 Switching Devices (8.7.1) 181Scenario: Layer 2 Threats 181Step 1 Basic Preparation 182Step 2 Basic Configuration 182Step 3 Configuring VLANs and VTP 184Step 4 Layer 2 Attacks and Mitigation 186Step 5 Protecting Against MAC Flooding 187Step 6 DHCP Spoofing 188Step 7 AAA 191Lab 8-2: Securing Spanning Tree Protocol (8.7.2) 193Scenario: Protecting the Root Bridge and Preventing Rogue Access Points 193Step 1 Verify Configurations from Lab 8-1 193Step 2 Locking Down the Spanning Tree Root 197Step 3 spanning-tree guard root 199Step 4 Verify Root Guard 199Step 5 BPDU Guard 201Step 6 UDLD 202Lab 8-3: Securing VLANs with Private VLANs, RACLs, and VACLs(8.7.3) 204Scenario: Configuring the Network to Secure VLANs 204Step 1 Verifying Loaded Configurations 204Step 2 Private VLANs 207Step 3 RACLs 210Step 4 VACLs 211Chapter 9 Case Studies 213Case Study 1: VLANs, VTP, and Inter-VLAN Routing 213Case Study 2: Voice and Security in a Switched Network 215show more

Rating details

5 ratings
3.6 out of 5 stars
5 0% (0)
4 60% (3)
3 40% (2)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X