Filter Keyword to...

Category: IT Professionals

Results Per Page :
Determining how web traffic will be sent to the Cisco Web Security Appliance (WSA) is often perceived as the most challenging portion of the Cisco WSA integration, since it involves devices outside the WSA....
[READ MORE]
Determining how web traffic will be sent to the Cisco Web Security Appliance (WSA) is often perceived as the most challenging portion of the Cisco WSA integration, since it involves devices outside the WSA. In this course, you will learn Cisco WSA deployment approaches while exploring Cisco WSA key features and supported policies. You'll also learn how to configure identities and user authentication on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Determining how web traffic will be sent to the Cisco Web Security Appliance (WSA) is often perceived as the most challenging portion of the Cisco WSA integration, since it involves devices outside the WSA. In this course, you will learn Cisco WSA deployment approaches while exploring Cisco WSA key features and supported policies. You'll also learn how to configure identities and user authentication on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
The Cisco ESA uses two different sets of mail policies for message content security allowing different security rules to be defined for messages sent to your users and messages sent from your users. In this...
[READ MORE]
The Cisco ESA uses two different sets of mail policies for message content security allowing different security rules to be defined for messages sent to your users and messages sent from your users. In this course, you will learn how to configure the different features within the incoming and outgoing mail policies; anti-spam, anti-virus, content filters, outbreak filters, and data loss prevention. You will also be able to describe the reporting functions and the tools used for troubleshooting the mail processing flows. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
The Cisco ESA uses two different sets of mail policies for message content security allowing different security rules to be defined for messages sent to your users and messages sent from your users. In this course, you will learn how to configure the different features within the incoming and outgoing mail policies; anti-spam, anti-virus, content filters, outbreak filters, and data loss prevention. You will also be able to describe the reporting functions and the tools used for troubleshooting the mail processing flows. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Cisco Web Security Appliance (WSA) enables you to control user access based on the web server category of a particular HTTP or HTTPS request. Using access policy groups, you can create access policies that...
[READ MORE]
Cisco Web Security Appliance (WSA) enables you to control user access based on the web server category of a particular HTTP or HTTPS request. Using access policy groups, you can create access policies that control access to websites containing objectionable or questionable content. The sites that are blocked, allowed, or decrypted depend on the categories that you select when you set up URL category filtering within each policy group. In this course, you will learn acceptable use controls provided by the Cisco WSA and the anti-malware feature and its implementation on the Cisco WSA. You will also learn how to configure decryption policies on Cisco Web Security Appliance and the data security controls available on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
Cisco Web Security Appliance (WSA) enables you to control user access based on the web server category of a particular HTTP or HTTPS request. Using access policy groups, you can create access policies that control access to websites containing objectionable or questionable content. The sites that are blocked, allowed, or decrypted depend on the categories that you select when you set up URL category filtering within each policy group. In this course, you will learn acceptable use controls provided by the Cisco WSA and the anti-malware feature and its implementation on the Cisco WSA. You will also learn how to configure decryption policies on Cisco Web Security Appliance and the data security controls available on the Cisco WSA. This course is one of a series in the SkillSoft learning path that covers the objectives for the Implementing Cisco Threat Control Solutions (SITCS) 1.0 (300-207 SITCS) exam.
[READ LESS]
Produced by: SkillSoft
Your company should have a scalable and flexible network, and you can achieve that goal by having a hierarchical, layered design. Today, switches are not only Layer 2 devices, many of them are capable of...
[READ MORE]
Your company should have a scalable and flexible network, and you can achieve that goal by having a hierarchical, layered design. Today, switches are not only Layer 2 devices, many of them are capable of performing Layer 3 features. With some Cisco switches, you can reallocate system resources in order for the switch to optimize support for specific features. This reallocation is done through changing of the SDM template. For example, if you want to implement IPv6 addressing on an access layer switch, you will need to change the SDM template. Cisco Discovery Protocol is a great tool to perform network discovery, but it is a Cisco proprietary solution. LLDP is a standard alternative to Cisco Discovery Protocol. PoE is a LAN technology that allows you to supply devices, such as IP phones and wireless APs, with power over an Ethernet cable. Supplying the device with power over the same cable as data eliminates the need for a power adapter, lowers the cost of implementation, provides easier maintenance, and provides greater installation flexibility than with traditional wiring. This course begins with an overview of all the components associated with a well-designed campus network. This course also explains the difference between Layer 2 and multilayer switch operation, how to change and verify the SDM template, and how to enable and verify LLDP neighbors. Lastly, this course will cover PoE and how to verify power consumption on a switch. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
Your company should have a scalable and flexible network, and you can achieve that goal by having a hierarchical, layered design. Today, switches are not only Layer 2 devices, many of them are capable of performing Layer 3 features. With some Cisco switches, you can reallocate system resources in order for the switch to optimize support for specific features. This reallocation is done through changing of the SDM template. For example, if you want to implement IPv6 addressing on an access layer switch, you will need to change the SDM template. Cisco Discovery Protocol is a great tool to perform network discovery, but it is a Cisco proprietary solution. LLDP is a standard alternative to Cisco Discovery Protocol. PoE is a LAN technology that allows you to supply devices, such as IP phones and wireless APs, with power over an Ethernet cable. Supplying the device with power over the same cable as data eliminates the need for a power adapter, lowers the cost of implementation, provides easier maintenance, and provides greater installation flexibility than with traditional wiring. This course begins with an overview of all the components associated with a well-designed campus network. This course also explains the difference between Layer 2 and multilayer switch operation, how to change and verify the SDM template, and how to enable and verify LLDP neighbors. Lastly, this course will cover PoE and how to verify power consumption on a switch. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
[READ LESS]
Produced by: SkillSoft
Knowing the function of VLANs and trunks and how to configure them is the core knowledge needed for building a switched network. VLANs can span across the whole network or they can be configured to remain...
[READ MORE]
Knowing the function of VLANs and trunks and how to configure them is the core knowledge needed for building a switched network. VLANs can span across the whole network or they can be configured to remain local. VLANs play a critical role in deployment of voice and wireless networks. Even if you are not a specialist in one of those two fields, it is important to understand their basics because both voice and wireless often rely on a basic switched network. When you create VLANs, their names and descriptions are stored in a VLAN database. There is a mechanism called VTP that dynamically distributes this information between switches. However, even if you do not plan to use it in your network, you should be aware of it, since it can cause havoc in some circumstances. The course covers how to implement and configure VLANS and trunks The course also covers the VLAN Trunking Protocol (VTP) including VTP modes, operation, versions, configuration and different configuration recommendations. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
Knowing the function of VLANs and trunks and how to configure them is the core knowledge needed for building a switched network. VLANs can span across the whole network or they can be configured to remain local. VLANs play a critical role in deployment of voice and wireless networks. Even if you are not a specialist in one of those two fields, it is important to understand their basics because both voice and wireless often rely on a basic switched network. When you create VLANs, their names and descriptions are stored in a VLAN database. There is a mechanism called VTP that dynamically distributes this information between switches. However, even if you do not plan to use it in your network, you should be aware of it, since it can cause havoc in some circumstances. The course covers how to implement and configure VLANS and trunks The course also covers the VLAN Trunking Protocol (VTP) including VTP modes, operation, versions, configuration and different configuration recommendations. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
[READ LESS]
Produced by: SkillSoft
Configuring IPv4 IP addresses on every device in the network can be a burdensome task. DHCP greatly reduces that administrative overhead and offers some additional features. DHCP can be used even to assign a...
[READ MORE]
Configuring IPv4 IP addresses on every device in the network can be a burdensome task. DHCP greatly reduces that administrative overhead and offers some additional features. DHCP can be used even to assign a specific IP address to a device. This can be useful for servers in your network. There are also DHCP options that offer additional information that can be pushed down to DHCP clients. Probably the most common example is DHCP option 150, which is used to tell IP phones the IP address of a TFTP server. IPv6 has a number of dynamic address allocation mechanisms, including stateless autoconfiguration, DHCPv6, and stateless DHCPv6 (also known as DHCPv6 Lite). EtherChannel can be used to bundle physical links in one virtual link, thus increasing throughput. There are multiple ways that traffic can be distributed over the physical links within the EtherChannel. The course covers how to negotiate, configure, and verify DHCP implementation, including how to manually assign IP addresses through DHCP. This course also covers how to implement DHCP for IPv6 and configure layer 2 port aggregation. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
Configuring IPv4 IP addresses on every device in the network can be a burdensome task. DHCP greatly reduces that administrative overhead and offers some additional features. DHCP can be used even to assign a specific IP address to a device. This can be useful for servers in your network. There are also DHCP options that offer additional information that can be pushed down to DHCP clients. Probably the most common example is DHCP option 150, which is used to tell IP phones the IP address of a TFTP server. IPv6 has a number of dynamic address allocation mechanisms, including stateless autoconfiguration, DHCPv6, and stateless DHCPv6 (also known as DHCPv6 Lite). EtherChannel can be used to bundle physical links in one virtual link, thus increasing throughput. There are multiple ways that traffic can be distributed over the physical links within the EtherChannel. The course covers how to negotiate, configure, and verify DHCP implementation, including how to manually assign IP addresses through DHCP. This course also covers how to implement DHCP for IPv6 and configure layer 2 port aggregation. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
[READ LESS]
Produced by: SkillSoft
Layer 2 security implementation is often forgotten. However, you should take the basic security measures to guard against a host of attacks that can be launched at a switch and its ports. Two common security...
[READ MORE]
Layer 2 security implementation is often forgotten. However, you should take the basic security measures to guard against a host of attacks that can be launched at a switch and its ports. Two common security measures are implementing port security and port access lists. Network or host misconfigurations, host malfunctions, or intentional DoS attacks may flood the network with traffic storms. Cisco IOS switches provide the storm control feature to limit the impact of traffic storms and, if necessary, take appropriate actions. In this course you'll learn what a traffic storm is and how to control it, you'll also learn how to configure storm control and verify its behavior. In addition, this course will introduce the importance of switch security, and describe all the recommended practices for securing a switch. Lastly, you'll learn how to configure and verify simple port security, configure and verify port security by using sticky MAC address, what can cause ports to become error-disabled and how to recover from this state as well as how to define and configure port access lists. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years
Layer 2 security implementation is often forgotten. However, you should take the basic security measures to guard against a host of attacks that can be launched at a switch and its ports. Two common security measures are implementing port security and port access lists. Network or host misconfigurations, host malfunctions, or intentional DoS attacks may flood the network with traffic storms. Cisco IOS switches provide the storm control feature to limit the impact of traffic storms and, if necessary, take appropriate actions. In this course you'll learn what a traffic storm is and how to control it, you'll also learn how to configure storm control and verify its behavior. In addition, this course will introduce the importance of switch security, and describe all the recommended practices for securing a switch. Lastly, you'll learn how to configure and verify simple port security, configure and verify port security by using sticky MAC address, what can cause ports to become error-disabled and how to recover from this state as well as how to define and configure port access lists. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years
[READ LESS]
Produced by: SkillSoft
While much attention focuses on security attacks from outside the walls of an organization and at the upper OSI layers, campus access devices and Layer 2 communication are largely unconsidered in most...
[READ MORE]
While much attention focuses on security attacks from outside the walls of an organization and at the upper OSI layers, campus access devices and Layer 2 communication are largely unconsidered in most security discussions. Only authorized devices and users should be able to access ports on your access layer switches. In this course you will learn about a more centralized security solution that is the AAA framework. Equipment malfunction and malicious attacks can bring down your network. You will also learn how storm control mechanisms, DHCP snooping, IP source guard, dynamic ARP inspection can aid in your efforts of having a secure and stable network. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
While much attention focuses on security attacks from outside the walls of an organization and at the upper OSI layers, campus access devices and Layer 2 communication are largely unconsidered in most security discussions. Only authorized devices and users should be able to access ports on your access layer switches. In this course you will learn about a more centralized security solution that is the AAA framework. Equipment malfunction and malicious attacks can bring down your network. You will also learn how storm control mechanisms, DHCP snooping, IP source guard, dynamic ARP inspection can aid in your efforts of having a secure and stable network. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
[READ LESS]
Produced by: SkillSoft
Campus access devices and Layer 2 communication are largely unconsidered in most security discussions; Equipment malfunction and internal malicious attacks can also bring down your network. In this course you...
[READ MORE]
Campus access devices and Layer 2 communication are largely unconsidered in most security discussions; Equipment malfunction and internal malicious attacks can also bring down your network. In this course you will learn about private VLANs are used to help segment traffic within a single VLAN and how VLAN access lists can aid in your efforts of having a secure and stable network. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
Campus access devices and Layer 2 communication are largely unconsidered in most security discussions; Equipment malfunction and internal malicious attacks can also bring down your network. In this course you will learn about private VLANs are used to help segment traffic within a single VLAN and how VLAN access lists can aid in your efforts of having a secure and stable network. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
[READ LESS]
Produced by: SkillSoft
FHRP is a category of protocols that includes HSRP, as well as VRRP and GLBP. All three protocols have versions that support first-hop redundancy not only in IPv4 environments, but also in IPv6 environments....
[READ MORE]
FHRP is a category of protocols that includes HSRP, as well as VRRP and GLBP. All three protocols have versions that support first-hop redundancy not only in IPv4 environments, but also in IPv6 environments. However, not all platforms and their Cisco IOS versions support all of these three protocols for both IPv4 and IPv6. In this course you'll learn how to configure and verify VRRP and GLBP. You'll also learn how to configure and verify GLBP in an IPv6 environment. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
FHRP is a category of protocols that includes HSRP, as well as VRRP and GLBP. All three protocols have versions that support first-hop redundancy not only in IPv4 environments, but also in IPv6 environments. However, not all platforms and their Cisco IOS versions support all of these three protocols for both IPv4 and IPv6. In this course you'll learn how to configure and verify VRRP and GLBP. You'll also learn how to configure and verify GLBP in an IPv6 environment. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
[READ LESS]
Produced by: SkillSoft
Continuous access to applications, data, and content demands a network wide resilience to increase IP network availability. A high-availability network is achieved by applying network-level resiliency,...
[READ MORE]
Continuous access to applications, data, and content demands a network wide resilience to increase IP network availability. A high-availability network is achieved by applying network-level resiliency, system-level resiliency, management, and monitoring. Network-level resiliency is achieved by adding redundant devices and connections into the network. System-level resiliency is achieved by adding redundant modules, such as power supplies, supervisor engines, and other components, to a modular device. Added redundancy often results in added complexity of the network. Complexity of the network can be reduced by the implementation of switch virtualization. Management and monitoring systems alarm the network operators, so they can respond to network and system outages and place appropriate actions to prevent a network QoS reduction or downtime. Different tools and features are available to monitor and manage network devices, traffic flows, and consistency with the SLAs. The course covers how to configure NTP and SNMPv3. It also covers how to configure a basic IOS IP SLA for network monitoring, local and remote SPAN and how to verify switch virtualization. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years
Continuous access to applications, data, and content demands a network wide resilience to increase IP network availability. A high-availability network is achieved by applying network-level resiliency, system-level resiliency, management, and monitoring. Network-level resiliency is achieved by adding redundant devices and connections into the network. System-level resiliency is achieved by adding redundant modules, such as power supplies, supervisor engines, and other components, to a modular device. Added redundancy often results in added complexity of the network. Complexity of the network can be reduced by the implementation of switch virtualization. Management and monitoring systems alarm the network operators, so they can respond to network and system outages and place appropriate actions to prevent a network QoS reduction or downtime. Different tools and features are available to monitor and manage network devices, traffic flows, and consistency with the SLAs. The course covers how to configure NTP and SNMPv3. It also covers how to configure a basic IOS IP SLA for network monitoring, local and remote SPAN and how to verify switch virtualization. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years
[READ LESS]
Produced by: SkillSoft
To transport packets among VLANs, you need a Layer 3 device. This device can be either a router or a switch with Layer 3 capabilities. Inter-VLAN routing can be performed by an external router that uses a...
[READ MORE]
To transport packets among VLANs, you need a Layer 3 device. This device can be either a router or a switch with Layer 3 capabilities. Inter-VLAN routing can be performed by an external router that uses a separate link for each VLAN. Because the number of physical connections on a switch is limited, this solution is not scalable. A better solution is to have a single trunk link, between the router and the switch, that carries data for all VLANs. This setup is commonly called a router on a stick or a one-armed router. A convenient solution is to have a device, such as a multilayer switch, that combines switching and routing functions into one device. In that case, no external router is needed. In this course, you'll learn how to configure an external router for inter-VLAN routing and learn the steps the configure routing on a multilayer switch. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years
To transport packets among VLANs, you need a Layer 3 device. This device can be either a router or a switch with Layer 3 capabilities. Inter-VLAN routing can be performed by an external router that uses a separate link for each VLAN. Because the number of physical connections on a switch is limited, this solution is not scalable. A better solution is to have a single trunk link, between the router and the switch, that carries data for all VLANs. This setup is commonly called a router on a stick or a one-armed router. A convenient solution is to have a device, such as a multilayer switch, that combines switching and routing functions into one device. In that case, no external router is needed. In this course, you'll learn how to configure an external router for inter-VLAN routing and learn the steps the configure routing on a multilayer switch. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years
[READ LESS]
Produced by: SkillSoft
FHRP is a networking protocol that is designed to protect the default gateway by allowing two or more routers or Layer 3 switches to provide a backup for that address. If one first-hop device fails, the...
[READ MORE]
FHRP is a networking protocol that is designed to protect the default gateway by allowing two or more routers or Layer 3 switches to provide a backup for that address. If one first-hop device fails, the backup router will take over the address, by default within a few seconds. FHRP is a category of protocols that includes the HSRP protocol. HSRP has versions that support first-hop redundancy not only in IPv4 environments, but also in IPv6 environments. However, not all platforms and their Cisco IOS versions support the different versions of FHRPs for both IPv4 and IPv6. In this course you'll learn how to configure and verify HSRP. You'll also learn how to configure and verify HSRP in an IPv6 environment. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
FHRP is a networking protocol that is designed to protect the default gateway by allowing two or more routers or Layer 3 switches to provide a backup for that address. If one first-hop device fails, the backup router will take over the address, by default within a few seconds. FHRP is a category of protocols that includes the HSRP protocol. HSRP has versions that support first-hop redundancy not only in IPv4 environments, but also in IPv6 environments. However, not all platforms and their Cisco IOS versions support the different versions of FHRPs for both IPv4 and IPv6. In this course you'll learn how to configure and verify HSRP. You'll also learn how to configure and verify HSRP in an IPv6 environment. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
[READ LESS]
Produced by: SkillSoft
A redundant topology can eliminate the possibility of a single point of failure causing a loss of function for the entire network; While it has benefits, a redundant topology also causes problems, such as...
[READ MORE]
A redundant topology can eliminate the possibility of a single point of failure causing a loss of function for the entire network; While it has benefits, a redundant topology also causes problems, such as loops. STP provides network link redundancy while eliminating these problems. In this course you will learn the need, standards, and operation of STP. You will also be able to explain BPDUs, the root bridge, the root port, and the designated port selection process. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
A redundant topology can eliminate the possibility of a single point of failure causing a loss of function for the entire network; While it has benefits, a redundant topology also causes problems, such as loops. STP provides network link redundancy while eliminating these problems. In this course you will learn the need, standards, and operation of STP. You will also be able to explain BPDUs, the root bridge, the root port, and the designated port selection process. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
[READ LESS]
Produced by: SkillSoft
STP is a very mature protocol, benefiting from years of development and production deployment. However, STP makes assumptions about the quality of the network, and the protocol can fail. Those failures are...
[READ MORE]
STP is a very mature protocol, benefiting from years of development and production deployment. However, STP makes assumptions about the quality of the network, and the protocol can fail. Those failures are generally high-profile failures because of the extent to which they impact the network. STP is designed to never open a loop, even temporarily, during its operation. However, like any protocol, it is based on some assumptions that might not be valid in the network. To help STP converge faster and for the protocol behavior to match your network infrastructure, several features are available to filter the way that BPDUs are sent or received, and to alter the way the network should react in case of an unexpected network topology change. 802.1Q and PVST+ represent two extremes of STP operation. 802.1Q has only a single instance for all VLANs in the network. If your network is running 1000 VLANs, only one instance runs for all 1000 VLANs. With PVST+, one instance is used for each active VLAN in the network. If your network has 1000 VLANs, there will be 1000 independent instances of STP running. MST is a concept of mapping one or more VLANs to a single STP instance. The course explains how and where to configure mechanisms such as PortFast, UplinkFast, BackboneFast, BPDU guard, BPDU filter, root guard, loop guard, UDLD, and FlexLinks. This course also covers how to configure MST. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
STP is a very mature protocol, benefiting from years of development and production deployment. However, STP makes assumptions about the quality of the network, and the protocol can fail. Those failures are generally high-profile failures because of the extent to which they impact the network. STP is designed to never open a loop, even temporarily, during its operation. However, like any protocol, it is based on some assumptions that might not be valid in the network. To help STP converge faster and for the protocol behavior to match your network infrastructure, several features are available to filter the way that BPDUs are sent or received, and to alter the way the network should react in case of an unexpected network topology change. 802.1Q and PVST+ represent two extremes of STP operation. 802.1Q has only a single instance for all VLANs in the network. If your network is running 1000 VLANs, only one instance runs for all 1000 VLANs. With PVST+, one instance is used for each active VLAN in the network. If your network has 1000 VLANs, there will be 1000 independent instances of STP running. MST is a concept of mapping one or more VLANs to a single STP instance. The course explains how and where to configure mechanisms such as PortFast, UplinkFast, BackboneFast, BPDU guard, BPDU filter, root guard, loop guard, UDLD, and FlexLinks. This course also covers how to configure MST. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
[READ LESS]
Produced by: SkillSoft
Redundant topology can eliminate the possibility of a single point of failure causing a loss of function for the entire network While it has benefits, redundant topology also causes problems, such as loops....
[READ MORE]
Redundant topology can eliminate the possibility of a single point of failure causing a loss of function for the entire network While it has benefits, redundant topology also causes problems, such as loops. STP provides network link redundancy while eliminating these problems. The course covers RSTP implementation including the need, standards, and operation of STP. This course also covers BPDUs, and the Root Bridge, Root Port, and Designated Port selection process. In addition this course lists and explains STP and RSTP port states, concepts of PVST, RSTP and STP port roles and how STP handles topology changes. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
Redundant topology can eliminate the possibility of a single point of failure causing a loss of function for the entire network While it has benefits, redundant topology also causes problems, such as loops. STP provides network link redundancy while eliminating these problems. The course covers RSTP implementation including the need, standards, and operation of STP. This course also covers BPDUs, and the Root Bridge, Root Port, and Designated Port selection process. In addition this course lists and explains STP and RSTP port states, concepts of PVST, RSTP and STP port roles and how STP handles topology changes. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years.
[READ LESS]
Produced by: SkillSoft
Immersive video solutions are the top end collaboration products developed by Cisco. For a near real experience in major conferencing solutions TelePresence is the highest intelligent quality solution. Cisco...
[READ MORE]
Immersive video solutions are the top end collaboration products developed by Cisco. For a near real experience in major conferencing solutions TelePresence is the highest intelligent quality solution. Cisco TelePresence video conferencing solution requires precise QoS and configuration. This course covers the endpoint options for immersive video. It also covers conference room requirements for lighting and sound. This course is one of a series in the Skillsoft learning path that covers the objectives for the Cisco exam Implementing Cisco Video Network Devices, Part 1 (CIVND1) v1. This exam counts toward the CCNA Collaboration certification.
Immersive video solutions are the top end collaboration products developed by Cisco. For a near real experience in major conferencing solutions TelePresence is the highest intelligent quality solution. Cisco TelePresence video conferencing solution requires precise QoS and configuration. This course covers the endpoint options for immersive video. It also covers conference room requirements for lighting and sound. This course is one of a series in the Skillsoft learning path that covers the objectives for the Cisco exam Implementing Cisco Video Network Devices, Part 1 (CIVND1) v1. This exam counts toward the CCNA Collaboration certification.
[READ LESS]
Produced by: SkillSoft
Smooth operation and high availability of the network are crucial to organizations. Unplanned downtime can quickly lead to loss of productivity and, therefore, financial loss. To maximize the availability of...
[READ MORE]
Smooth operation and high availability of the network are crucial to organizations. Unplanned downtime can quickly lead to loss of productivity and, therefore, financial loss. To maximize the availability of the network, it is important to plan network maintenance processes and procedures carefully. Troubleshooting is a part of network maintenance that every network engineer needs to be capable of performing. In complex environments, troubleshooting can be a daunting task, and the only way to diagnose and resolve problems quickly and effectively is by following a structured approach. This approach involves having well-defined and documented troubleshooting procedures and aligning troubleshooting procedures to general network maintenance procedures. Additionally, troubleshooting can be a very time-consuming process. Using the tools built into the Cisco IOS Software can help shorten the time to diagnose and resolve problems quickly. There are many technologies and protocols that can be leveraged in combination with specialized tools and applications to support troubleshooting and maintenance processes. This course describes troubleshooting methodologies as well as troubleshooting procedures and processes. Basic Cisco IOS tools and logging procedures are also covered.
Smooth operation and high availability of the network are crucial to organizations. Unplanned downtime can quickly lead to loss of productivity and, therefore, financial loss. To maximize the availability of the network, it is important to plan network maintenance processes and procedures carefully. Troubleshooting is a part of network maintenance that every network engineer needs to be capable of performing. In complex environments, troubleshooting can be a daunting task, and the only way to diagnose and resolve problems quickly and effectively is by following a structured approach. This approach involves having well-defined and documented troubleshooting procedures and aligning troubleshooting procedures to general network maintenance procedures. Additionally, troubleshooting can be a very time-consuming process. Using the tools built into the Cisco IOS Software can help shorten the time to diagnose and resolve problems quickly. There are many technologies and protocols that can be leveraged in combination with specialized tools and applications to support troubleshooting and maintenance processes. This course describes troubleshooting methodologies as well as troubleshooting procedures and processes. Basic Cisco IOS tools and logging procedures are also covered.
[READ LESS]
Produced by: SkillSoft
Enhanced Interior Gateway Routing Protocol (EIGRP) is a routing protocol commonly used in large enterprise networks. Troubleshooting problems related to the exchange of routing information is an essential...
[READ MORE]
Enhanced Interior Gateway Routing Protocol (EIGRP) is a routing protocol commonly used in large enterprise networks. Troubleshooting problems related to the exchange of routing information is an essential skill for any network engineer that is involved in the implementation and maintenance of large routed enterprise networks that use EIGRP as the IGP. Enterprise networks may make use of the Border Gateway Protocol (BGP) to exchange routing information in a controlled fashion with external parties such as Internet service providers or other providers of IP-based services. The exterior gateway protocol BGP is often used in combination with an interior gateway protocol such as Enhanced Interior Gateway Routing Protocol (EIGRP) routing protocol. And performance problems on network devices can cause degraded application performance and connectivity issues resulting in problems at the business level. Understanding the mechanics of BGP and its interaction with interior gateways, and diagnosing and resolving BGP performance problems are important skills for any network support engineer. This course reviews EIGRP and BGP operations and details the use of Cisco IOS commands to gather information about EIGRP and BGP data structures and routing processes. The course also explains EIGRP and BGP neighborship and routing issues as well as the typical solutions.
Enhanced Interior Gateway Routing Protocol (EIGRP) is a routing protocol commonly used in large enterprise networks. Troubleshooting problems related to the exchange of routing information is an essential skill for any network engineer that is involved in the implementation and maintenance of large routed enterprise networks that use EIGRP as the IGP. Enterprise networks may make use of the Border Gateway Protocol (BGP) to exchange routing information in a controlled fashion with external parties such as Internet service providers or other providers of IP-based services. The exterior gateway protocol BGP is often used in combination with an interior gateway protocol such as Enhanced Interior Gateway Routing Protocol (EIGRP) routing protocol. And performance problems on network devices can cause degraded application performance and connectivity issues resulting in problems at the business level. Understanding the mechanics of BGP and its interaction with interior gateways, and diagnosing and resolving BGP performance problems are important skills for any network support engineer. This course reviews EIGRP and BGP operations and details the use of Cisco IOS commands to gather information about EIGRP and BGP data structures and routing processes. The course also explains EIGRP and BGP neighborship and routing issues as well as the typical solutions.
[READ LESS]
Produced by: SkillSoft
An essential element in building highly available networks is the implementation of a First Hop Redundancy Protocol (FHRP). FHRPs, such as the Hot Standby Router Protocol (HSRP), Virtual Router Redundancy...
[READ MORE]
An essential element in building highly available networks is the implementation of a First Hop Redundancy Protocol (FHRP). FHRPs, such as the Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP), and Gateway Load Balancing Protocol (GLBP), can prevent loss of connectivity by providing redundant default gateway functionality in a way that is transparent to the end hosts. Performance issues can adversely affect a business as employees may not be able to service their customers correctly. But does a network cause the problem or does a client, a server, or an application cause the problem? It is important to establish the realistic network performance expectations, and to be able to determine if switches are not performing as expected. It is also important to identify and possibly resolve the cause of the observed difference between the expected performance and the actual performance. This course reviews the operation of the common FHRPs and how to use Cisco IOS commands to diagnose and resolve problems that might occur while using these protocols. Using Cisco IOS commands to diagnose physical and data link layer problems on switch ports is also covered.
An essential element in building highly available networks is the implementation of a First Hop Redundancy Protocol (FHRP). FHRPs, such as the Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP), and Gateway Load Balancing Protocol (GLBP), can prevent loss of connectivity by providing redundant default gateway functionality in a way that is transparent to the end hosts. Performance issues can adversely affect a business as employees may not be able to service their customers correctly. But does a network cause the problem or does a client, a server, or an application cause the problem? It is important to establish the realistic network performance expectations, and to be able to determine if switches are not performing as expected. It is also important to identify and possibly resolve the cause of the observed difference between the expected performance and the actual performance. This course reviews the operation of the common FHRPs and how to use Cisco IOS commands to diagnose and resolve problems that might occur while using these protocols. Using Cisco IOS commands to diagnose physical and data link layer problems on switch ports is also covered.
[READ LESS]
Produced by: SkillSoft
When troubleshooting IP addressing and routing issues, you might need to determine a client's IPv4, IPv6, and MAC addresses. The method of obtaining this addressing varies with operating system. There are...
[READ MORE]
When troubleshooting IP addressing and routing issues, you might need to determine a client's IPv4, IPv6, and MAC addresses. The method of obtaining this addressing varies with operating system. There are a number of ways in which to assign IP addresses to devices throughout the network as well as numerous ways to verify an address depending on issue at hand. This course describes the ways in which to assign IPv4 and IPv6 addresses to various hosts as well as how to troubleshoot the various IP address assignment methods. Troubleshooting IPv4 and IPv6 basic routing is also covered.
When troubleshooting IP addressing and routing issues, you might need to determine a client's IPv4, IPv6, and MAC addresses. The method of obtaining this addressing varies with operating system. There are a number of ways in which to assign IP addresses to devices throughout the network as well as numerous ways to verify an address depending on issue at hand. This course describes the ways in which to assign IPv4 and IPv6 addresses to various hosts as well as how to troubleshoot the various IP address assignment methods. Troubleshooting IPv4 and IPv6 basic routing is also covered.
[READ LESS]
Produced by: SkillSoft
Switched Ethernet has been the dominant LAN technology for more than a decade and VLAN-based switched infrastructures are at the core of every campus network. A good understanding of the processes involved in...
[READ MORE]
Switched Ethernet has been the dominant LAN technology for more than a decade and VLAN-based switched infrastructures are at the core of every campus network. A good understanding of the processes involved in Layer 2 switching and being able to diagnose and resolve Layer 2 switching problems in those environments is a fundamental skill that any network engineer should have. A primary tool in building highly available networks is the use of redundant devices and links. With these redundant links, bridging loops can be introduced, resulting in broadcast storms that can potentially cripple the network. The Spanning Tree Protocol (STP) acts as a safety net by breaking those loops and preventing broadcast storms. Spanning tree failures can be catastrophic when they happen, so recognizing the symptoms and having an action plan for these types of failures is a skill that is essential in reducing network downtime. The traditional distinction between routers and switches has become blurred over the past decade and multilayer switches have taken over the role of the router in the campus LAN environment. It is important for network engineers to understand the differences between hardware-accelerated Layer 3 switching and software-based routing architectures, and how these differences translate to the troubleshooting process. In this course, the Layer 2 switching process and associated switch data structures are reviewed, as is the diagnosing of VLAN and trunking problems using the Cisco IOS command line interface. It will also explain how to diagnose spanning-tree problems using the Cisco IOS command line interface. Multilayer switching concepts and how to diagnose specific problems related to multilayer switching, switched virtual interfaces (SVIs), and inter-VLAN routing are also detailed.
Switched Ethernet has been the dominant LAN technology for more than a decade and VLAN-based switched infrastructures are at the core of every campus network. A good understanding of the processes involved in Layer 2 switching and being able to diagnose and resolve Layer 2 switching problems in those environments is a fundamental skill that any network engineer should have. A primary tool in building highly available networks is the use of redundant devices and links. With these redundant links, bridging loops can be introduced, resulting in broadcast storms that can potentially cripple the network. The Spanning Tree Protocol (STP) acts as a safety net by breaking those loops and preventing broadcast storms. Spanning tree failures can be catastrophic when they happen, so recognizing the symptoms and having an action plan for these types of failures is a skill that is essential in reducing network downtime. The traditional distinction between routers and switches has become blurred over the past decade and multilayer switches have taken over the role of the router in the campus LAN environment. It is important for network engineers to understand the differences between hardware-accelerated Layer 3 switching and software-based routing architectures, and how these differences translate to the troubleshooting process. In this course, the Layer 2 switching process and associated switch data structures are reviewed, as is the diagnosing of VLAN and trunking problems using the Cisco IOS command line interface. It will also explain how to diagnose spanning-tree problems using the Cisco IOS command line interface. Multilayer switching concepts and how to diagnose specific problems related to multilayer switching, switched virtual interfaces (SVIs), and inter-VLAN routing are also detailed.
[READ LESS]
Produced by: SkillSoft
IP routing is the core technology deployed in all current enterprise networks and is used in all areas of the network. For most connectivity problems in IP networks, the network layer is the point where...
[READ MORE]
IP routing is the core technology deployed in all current enterprise networks and is used in all areas of the network. For most connectivity problems in IP networks, the network layer is the point where troubleshooting processes start. The Open Shortest Path First (OSPF) protocol is a routing protocol commonly used in large enterprise networks. Troubleshooting problems related to the exchange of routing information is an essential skill for any network engineer that is involved in the implementation and maintenance of large routed enterprise networks that use OSPF as the IGP. This course reviews the processes and data structures that are used by routers to forward IP packets and the Cisco IOS tools that can be used to diagnose problems related to IP packet forwarding, to provide you with the essential skills and knowledge that are necessary to resolve network layer problems successfully. In addition, the Cisco IOS commands that you can use to gather information as part of a structured troubleshooting process from OSPF routing processes are reviewed.
IP routing is the core technology deployed in all current enterprise networks and is used in all areas of the network. For most connectivity problems in IP networks, the network layer is the point where troubleshooting processes start. The Open Shortest Path First (OSPF) protocol is a routing protocol commonly used in large enterprise networks. Troubleshooting problems related to the exchange of routing information is an essential skill for any network engineer that is involved in the implementation and maintenance of large routed enterprise networks that use OSPF as the IGP. This course reviews the processes and data structures that are used by routers to forward IP packets and the Cisco IOS tools that can be used to diagnose problems related to IP packet forwarding, to provide you with the essential skills and knowledge that are necessary to resolve network layer problems successfully. In addition, the Cisco IOS commands that you can use to gather information as part of a structured troubleshooting process from OSPF routing processes are reviewed.
[READ LESS]
Produced by: SkillSoft
Ideally, a single routing protocol is used to exchange routing information in an enterprise network. However, organizational requirements such as partnerships, mergers, technology migrations, and changes in...
[READ MORE]
Ideally, a single routing protocol is used to exchange routing information in an enterprise network. However, organizational requirements such as partnerships, mergers, technology migrations, and changes in policy can make it necessary to support the use of multiple routing protocols in the same enterprise network. In such situations, route redistribution between the different routing protocols is often necessary to achieve IP connectivity between the different parts of the network, and this adds an extra layer of complexity to a routed network. As a support engineer, it is important to understand the issues that can occur with redistribution and implementing filtering and manipulation mechanisms. This course reviews route map operation and explains the issues that can occur with redistribution into the OSPFv2 and OSPFv3 routing protocols as well as for EIGRP for IPv4 and IPv6. How to troubleshoot each issue is also detailed.
Ideally, a single routing protocol is used to exchange routing information in an enterprise network. However, organizational requirements such as partnerships, mergers, technology migrations, and changes in policy can make it necessary to support the use of multiple routing protocols in the same enterprise network. In such situations, route redistribution between the different routing protocols is often necessary to achieve IP connectivity between the different parts of the network, and this adds an extra layer of complexity to a routed network. As a support engineer, it is important to understand the issues that can occur with redistribution and implementing filtering and manipulation mechanisms. This course reviews route map operation and explains the issues that can occur with redistribution into the OSPFv2 and OSPFv3 routing protocols as well as for EIGRP for IPv4 and IPv6. How to troubleshoot each issue is also detailed.
[READ LESS]
Produced by: SkillSoft
Dynamic routing protocols such as RIPng play an important role in the enterprise networks of today. RIPng is used for routes in IPv6 networks and as a support engineer, it is important to understand how to...
[READ MORE]
Dynamic routing protocols such as RIPng play an important role in the enterprise networks of today. RIPng is used for routes in IPv6 networks and as a support engineer, it is important to understand how to diagnose and resolve RIPng routing protocol operational issues. This course reviews RIPng operations and the use of Cisco IOS commands to gather information about RIPng operations and routing processes as well as the implementation of solutions for various issues that can occur.
Dynamic routing protocols such as RIPng play an important role in the enterprise networks of today. RIPng is used for routes in IPv6 networks and as a support engineer, it is important to understand how to diagnose and resolve RIPng routing protocol operational issues. This course reviews RIPng operations and the use of Cisco IOS commands to gather information about RIPng operations and routing processes as well as the implementation of solutions for various issues that can occur.
[READ LESS]
Produced by: SkillSoft