Home > Store

CCNP Self-Study: Building Cisco Multilayer Switched Networks (BCMSN), 3rd Edition

Register your product to gain access to bonus material or receive a coupon.

CCNP Self-Study: Building Cisco Multilayer Switched Networks (BCMSN), 3rd Edition

Book

  • Sorry, this book is no longer in print.
Not for Sale

Description

  • Copyright 2006
  • Edition: 3rd
  • Book
  • ISBN-10: 1-58705-219-9
  • ISBN-13: 978-1-58705-219-4

Cisco authorized self-study book for CCNP switching foundation learning

Prepare for the CCNP BCMSN exam 642-811 with a Cisco authorized self-study guide. This book teaches you how to:

  • Configure basic parameters for Catalyst switches, including SSH, system host name, and IP address management in both Cisco IOS and Cisco CatOS
  • Employ private VLANs, VTP, and 802.1Q trunking in Cisco multilayer switched networks
  • Deploy 802.1D, 802.1D-2004, 802.1s, and 802.1w STP and utilize advanced spanning-tree features such as UplinkFast and root guard
  • Enable Layer 2 features such as including aggressive-mode UDLD, CDP, and Jumbo Ethernet Frames
  • Deploy Inter-VLAN routing
  • Implement QoS on Catalyst switches at Layers 2 and 3
  • Enable Layer 2 and Layer 3 multicasting features such as IGMP snooping
  • Employ VRRP, HSRP, and Supervisor Engine redundancy for high availability
  • Describe the requirements for IP telephony in multilayer switched networks
  • Implement control plane and data plane security features such as 802.1X and DHCP snooping
  • Deploy Ethernet over long distances with Metro Ethernet solutions such as DWDM and CDWM

CCNP Self-Study: Building Cisco Multilayer Switched Networks (BCMSN), Third Edition, is a Cisco® authorized, self-paced learning tool for CCNP® switching foundation learning. This book provides you with the knowledge needed to build scalable multilayer switched networks, to create and deploy a global intranet, and to implement basic troubleshooting techniques in environments that use Cisco multilayer switches for client hosts and services. By reading this book, you will learn how to improve traffic flow, reliability, redundancy, performance, and security for Layer 2 and Layer 3 switched networks.

This comprehensive book provides detailed information and easy-to-grasp tutorials on design, configuration, operation, and troubleshooting of modern multilayer switched networks. This book introduces Cisco Catalyst® switching architectures, including Cisco Express Fowarding, ternary content addressable memory (TCAM), and the Cisco 6500, 4500, 3750, 3550, and 2950 series of switches. The book places an emphasis on configuring Cisco Catalyst switches with Cisco IOS® Software, with many chapters covering both Cisco IOS and Cisco CatOS. You will also learn about emerging technologies such as multicasting, security, IP telephony, storage area networking, and quality of service (QoS) as additions to the campus network design. The book concludes with a discussion of troubleshooting methodologies and tools. Each chapter opens with a list of objectives to help focus your study. Lab exercises are offered throughout to help illuminate theoretical concepts. Each chapter concludes with a summary of key concepts as well as review questions to reinforce your understanding.

This revision to the popular second edition is fully updated to include designs using new Catalyst products, references to the Catalyst 6500 Sup720, security updates throughout the entire book as well as added coverage of Dynamic Host Configuration Protocol (DHCP) snooping, Address Resolution Protocol (ARP) inspection, ARP throttling, revised metro coverage, and new discussions on voice virtual LANs (VLAN) and Rapid Spanning Tree Protocol (RSTP).

CCNP Self-Study: Building Cisco Multilayer Switched Networks (BCMSN), Third Edition, is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.

Sample Content

Online Sample Chapter

CCNP Self-Study: Understanding and Configuring Multilayer Switching

Downloadable Sample Chapter

Download - 161 KB -- Chapter 9: Understanding and Configuring Multilayer Switching

Table of Contents

Chapter 1                Introduction to Building Cisco Multilayer Switched Networks

    Hardware-Switching and Software-Switching Terminology

    Multilayer Switching Overview

    Understanding Layers 2, 3, 4, and 7 Switching Terminology

    Layer 2 Switching In-Depth

    Layer 3 Switching In-Depth

    Multilayer Switching

    Enterprise Composite Network Model for Building Cisco Multilayer Switched Networks

    The Cisco AVVID Framework

    Why Build Layer 3 Networks?

    Enterprise Composite Network Model

    Enterprise Campus

    Enterprise Edge

    Service Provider Edge

    Introducing the Cisco Catalyst Switches

    Catalyst 6500 Family of Switches

    Catalyst 4500 Family of Switches

    Catalyst 3550, 3560, and 3750 Family of Switches

    Catalyst 2950, 2955, and 2970 Family of Switches

    Study Tips

    Summary

    Review Questions

Chapter 2                The Roles of Switches in Designing Cisco Multilayer Switched Networks

    Data-Link Technologies

    10-Mbps Ethernet

    Fast Ethernet

    Gigabit Ethernet

    Fast Ethernet and Gigabit Ethernet Auto-Negotiation

    10-Gigabit Ethernet

    Gigabit Interface Converters

    Cisco Long-Reach Ethernet

    Metro Ethernet

    Designing Cisco Multilayer Switched Networks Using the Cisco Catalyst Switches and Data-Link Technologies

    Reviewing the Campus Infrastructure Module of the Enterprise Composite Network Model

    Selecting Layer 2 or Layer 3 Switches

    Small Campus Network Design

    Medium-Sized Campus Network Design

    Large Campus Network Design

    Server Farm Module

    Enterprise Edge

    Case Study: Designing a Cisco Multilayer Switched Network

    Study Tips

    Summary

    Review Questions

Chapter 3                Initial Configuration and Troubleshooting of Cisco Multilayer Switches

    Comparing Cisco CatOS and Cisco IOS

    Initial Configuration of Management Parameters of Cisco Catalyst Switches

    System Name

    Management IP Configuration

    Clock and NTP Settings

    Telnet and SSH

    DNS

    System Logging

    SNMP

    Managing Catalyst Switch Configurations

    Understanding the Cisco IOS File System (IFS) and Software Images on Catalyst Switches

    Naming Conventions Used by Hybrid and Cisco IOS Images on the Catalyst 6500 Family of Switches

    Upgrading Software Versions on Catalyst Switches

    Overview of Converting Cisco CatOS to Cisco Native IOS

    Basic Troubleshooting Practices

    Show and debug Commands

    Configurations and Commands Useful When Troubleshooting

    The Impact of debug Commands and Recommended Use

    Initial Configuration Troubleshooting Tips

    What to Do When You Are Unable to Connect to a Switch via Console Port

    What to Do When You Are Unable to Establish IP Connectivity to or from a Switch Using Telnet or SSH

    Study Tips

    Summary

    Configuration Exercise: Configuring a Cisco IOS—Based Catalyst Switch

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Establish Console (Out-of-Band) Connectivity and Configure Switch Name

    Task 2: Configure Switch for IP Connectivity

    Task 3: Configure Switch Usernames and Passwords for Privileged and In-Band Access

    Task 4: Configure Switch for SSH and Disable Telnet Access

    Task 5: Configure the Switch Time Settings, NTP Configuration, and System Logging Configuration

    Task 6: Upgrade Switch Cisco IOS Version to a Later Release

    Review Questions

Chapter 4                Implementing and Configuring VLANs

    VLANs

    Implementing VLANs in Campus Networks

    Understanding the Role and Benefits of VLANs in the Multilay

    Benefits of End-to-End and Local VLANs in Campus Networks

    Static and Dynamic VLANs

    VLAN Ranges

    Configuring VLANs

    Verifying the VLAN Configuration

    Troubleshooting VLANs

    Troubleshooting Slow Throughput

    Troubleshooting Communication Issues

    Private VLANs

    VLAN Trunking

    Implementing Trunking in Multilayer Switched Networks

    Trunking Protocols

    VLAN Ranges and Mappings

    Service Provider—Managed VLAN Services

    Cisco Trunking Modes and Methods

    Configuring ISL and 802.1Q Trunking

    Verifying Trunking Configurations

    Troubleshooting Trunking

    VLAN Trunking Protocol

    VTP Pruning

    VTP Versions

    VTP Authentication

    Configuring VTP

    Verifying the VTP Configuration

    Troubleshooting VTP

    Study Tips

    Summary

    Configuration Exercise: Configuring VLAN, Trunking, and VTP in Multilayer Switched Networks

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Create a VTP Management Domain

    Task 2: Configure Trunking

    Task 3: Configure VLANs

    Task 4: Assign VLANs with Ports on Your Switch

    Task 5: Add a New Switch to the Existing Network

    Task 6: Verify the VLAN and VTP Status

    Task 7: Configure pVLANs

    Review Questions

Chapter 5                Understanding and Configuring the 802.1D, 802.1s, and 802.1w Spanning Tree Protocols

    Overview of the Spanning Tree Protocol

    Identifying Bridging Loops

    Preventing Bridging Loops

    Building Loop-Free Networks

    STP (IEEE 802.1D)

    Bridge Identifier

    Spanning-Tree Path Cost

    Bridge Protocol Data Units

    Spanning-Tree Port States and BPDU Timers

    STP Operation

    Root Bridge Election

    Planning Root Bridge Selection

    Selection of Root and Designated Port on Nonroot Bridges

    Understanding Primary and Backup Root Bridges

    Sample Scenario of STP Election Process

    STP Topology Changes

    Per VLAN Spanning Tree Plus

    MAC Address Allocation and Reduction

    STP and IEEE 802.1Q Trunks

    Configuring the Basic Parameters of PVST+

    Configuring the Root Bridge

    Configuring Port Cost

    Verifying the STP Configuration

    Rapid Spanning Tree Protocol

    RSTP Port States

    RSTP Port Roles

    RSTP BPDU Format and BPDU Handling

    Rapid Transition to Forwarding

    RSTP Topology Change Mechanism

    Compatibility with 802.1D

    Multiple Spanning Tree

    PVST+ Case

    802.1Q Case

    MST Case

    MST Regions

    IST Instances

    MST Instances

    Configuring Basic Parameters of MST

    Study Tips

    Summary

    Configuration Exercise: Configuring and Verifying Spanning-Tree Bridge Priorities and Spanning-Tree Port Cost

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Configure and Verify Spanning Tree Root and Backup Bridges and STP Priorities

    Task 2: Configure and Verify Spanning Tree Port Cost

    Task 3: Identifying STP Topology Changes

    Review Questions

Chapter 6                Adding Resiliency to Spanning Tree Using Advanced Features and Troubleshooting STP Issues

    Enhancements to 802.1D Spanning Tree Protocol

    PortFast

    Configuring the PortFast Feature

    UplinkFast

    Configuration and Verification of UplinkFast

    BackboneFast

    Configuration and Verification of BackboneFast

    Improving Spanning-Tree Resiliency

    BPDU Guard

    BPDU Filtering

    Root Guard

    Preventing Forwarding Loops and Black Holes

    Loop Guard

    Comparison Between Aggressive Mode UDLD and Loop Guard

    Troubleshooting STP

    Potential STP Problems

    Troubleshooting Methodology for STP Problems

    Know the Network

    Identify a Bridging Loop

    Restore Connectivity

    Check Port Status

    Look for Resource Errors

    Disable Unneeded Features

    Study Tips

    Summary

    Configuration Exercise: Configuring BackboneFast, UplinkFast, Root Guard, and PortFast

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Configure and Verify BackboneFast

    Task 2: Configure and Verify UplinkFast

    Task 3: Configure and Verify Root Guard

    Task 4: Configure and Verify PortFast

    Configuration Exercise: Identify and Resolve a Layer 2 Loop

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Identifying the Layer 2 Loop

    Task 2: Divide and Conquer (Disconnect Redundancy)

    Task 3: Find Root Cause of Layer 2 Loop (Investigate Network and Hardware)

    Task 4 (optional): Check Software Statistics

    Review Questions

Chapter 7                Enhancing Network Stability, Functionality, Reliability, and Performance Using Advanced Features

    EtherChannel

    PAgP Modes

    LACP Modes

    EtherChannel Guidelines

    EtherChannel Configuration Example

    EtherChannel Load Balancing

    CDP

    Voice VLAN and CDP

    Security Issues

    Multiple Default Gateways

    MAC Address Notification

    Layer 3 Protocol Filtering

    DHCP for Management IP Configuration

    Debounce Timer Feature

    Broadcast and Multicast Suppression

    Baby Giants and Jumbo Frames

    Error-Disable Feature

    IEEE 802.3 Flow Control

    UDLD and Aggressive Mode UDLD

    Case Study: Function of Aggressive Mode UDLD

    Study Tips

    Summary

    Configuration Exercise

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Configure and Verify EtherChannel

    Task 2: Configure and Verify LACP EtherChannel

    Task 3: Configure and Verify CDP

    Task 4: Configure and Verify Aggressive Mode UDLD

    Task 5: Configure and Verify Jumbo Frame

    Task 6: Configure and Verify Error-Disable

    Review Questions

Chapter 8                Understanding and Configuring Inter-VLAN Routing

    IP Address Hierarchy in a Multilayer Switched Network

    Introduction to Inter-VLAN Routing

    Connecting VLANs with Multilayer Catalyst Switches

    Router on a Stick (External Router)

    Verifying the Inter-VLAN Routing Configuration

    IP Broadcast Forwarding

    DHCP Relay Agent

    UDP Broadcast Forwarding

    Study Tips

    Summary

    Configuration Exercise: Configuring Inter-VLAN Routing on Cisco IOS—Based Catalyst Switches

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Configure Inter-VLAN Routing Using SVIs on a Building Distribution Switch

    Task 2: Configure Simple Routing Using EIGRP

    Task 3: Configure Inter-VLAN Routing Using a Router on a Stick

    Task 4: Configure SVI Interfaces for DHCP Forwarding

    Review Questions

Chapter 9                Understanding and Configuring Multilayer Switching

    Understanding Traditional MLS

    Understanding CEF-Based MLS

    Centralized and Distributed Switching

    Address Resolution Protocol Throttling

    Switching Table Architectures

    Sample CEF-Based MLS Operation

    CEF-Based MLS Load Sharing

    CEF-Based MLS Configuration, Verification, and Troubleshooting

    CEF-Based MLS Configuration

    CEF-Based MLS Verification and Troubleshooting

    CEF-Based MLS Troubleshooting Methodology

    Study Tips

    Summary

    Configuration Exercise: Troubleshooting CEFBased MLS

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Establish Console (Out-of-Band) Connectivity or Telnet or SSH Connectivity to the Switch

    Task 2: Determine the IP Routing Entry or Subnet That Is Experiencing Connectivity Problems or a CEF-Based MLS Issue

    Task 3: Verify the Cisco IOS IP Routing Table and ARP Entries for the Route

    Task 4: Verify the IP CEF FIB and Adjacency Entries for the Route

    Task 5: Debug the CEF FIB and Adjacency Table’s Downloads to the Centralized Switching and Distributed Switching Engines, and Verify the     TCAM Contents for FIB and Adjacency Tables

    Review Questions

Chapter 10                Understanding and Implementing Quality of Service in Cisco Multilayer Switched Networks

    The Need for QoS

    Latency

    Jitter

    Packet Loss

    QoS-Enabled Solutions

    QoS Service Models

    Integrated Services Architecture

    Differentiated Services

    Assured Forwarding and Expedited Forwarding

    Catalyst QoS Fundamentals

    Classification

    Marking

    Traffic Conditioning: Policing and Shaping

    Congestion Management

    Congestion Avoidance

    QoS in the Multilayer Switched Network

    QoS in the Building Access Submodule

    QoS in the Building Distribution Submodule

    QoS in the Campus Backbone

    Auto QoS

    Study Tips

    Summary

    Configuration Exercise: Configuring QoS on Cisco IOS—Based Catalyst Switches

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Globally Enable QoS

    Task 2: Configure the Switch to Trust DSCP on Interfaces FastEthernet 0/1 Through 0/10 if a Cisco IP Phone Is Attached

    Task 3: Configure the Switch to Classify All Incoming Frames on Interface FastEthernet 0/11 with a CoS Value of 4 for Untagged Frames

    Task 4: Configure a Policy Map, Class Map, and the Interface Such That All Ingress TCP Port 30000 Packets on FastEthernet0/11 Have 
    Their DSCP Set to 16

    Task 5: Configure All Egress Queues Such That CoS Values 4, 6, and 7 Use Queue 3 and a CoS Value of 5 Uses Queue 4

    Task 6: Configure Queue 4 as a Strict-Priority Queue

    Task 7: Configure WRR Weights Such That Queue 3 Receives Twice as Much Service as Any Other Single Queue

    Task 8: Verify All Configurations by Viewing Interface Statistics

    Review Questions

Chapter 11                Deploying Multicast in the Multilayer Switched Network

    Introduction to Multicast

    Multicast IP Address Structure

    Multicast MAC Address Structure

    Reverse Path Forwarding

    Multicast Forwarding Tree

    IP Multicast Protocols

    PIM

    IGMP

    Multicast Hardware-Based Switching Methods

    MMLS

    CEF-Based MMLS

    MFIB

    Layer 2 Multicast Protocols

    IGMP Snooping

    Cisco Group Management Protocol

    IP Multicast in the Multilayer Switched Network

    Configuring Multicast

    Monitoring and Verifying IP Multicast Traffic

    Study Tips

    Summary

    Configuration Exercise: Configuring and Verifying Multicast in the Multilayer Switched Network to Support Stock Ticker Video Applications

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Configure Multicast Routing with Sparse-Dense Mode on Distribution Switches

    Task 2: Configure the RP/Mapping Agent for Auto-RP on the Core Switches

    Review Questions

Chapter 12                Implementing High Availability Options in Multilayer Switches

    Achieving High Availability in Multilayer Switches

    Implementing Redundant Supervisor Engines in Catalyst Switches

    Route Processor Redundancy

    Route Processor Redundancy Plus

    Stateful Switchover (SSO)

    Configuring and Verifying SSO

    NSF with SSO

    Router Redundancy Using Single Router Mode on the Catalyst 6500 Series of Switches

    SRM Failure Scenario with a Catalyst 6500 Supervisor Engine II and MSFC2

    SRM Failure Scenario with Supervisor Engine IA

    SRM Configuration

    Implementing Redundant Supervisor Uplink Modules in Catalyst Switches

    Implementing Redundant Power Supplies

    Implementing Default Gateway Router Redundancy in Multilayer Switched Networks

    Proxy ARP

    IRDP

    Static Default Gateway Configuration

    Hot Standby Routing Protocol

    Virtual Router Redundancy Protocol

    VRRP Scenarios

    Gateway Load Balancing Protocol

    Cisco IOS Server Load Balancing

    Cisco IOS SLB Modes of Operation

    Configuring the Server Farm with Real Servers

    Configuring Virtual Servers

    Study Tips

    Summary

    Configuration Exercise: Configuring and Verifying RPR+ and HSRP

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Configure and Verify RPR+

    Task 2: Configure and Verify HSRP

    Review Questions

Chapter 13                Introduction to Deploying Cisco IP Telephony

    Introduction to IP Telephony Components

    Network Design Recommendations for IP Telephony

    QoS

    Voice (Auxiliary) VLANs

    Network Bandwidth Provisioning

    Power Considerations

    Network Management

    IP Telephony High Availability

    Security

    Best Practices for Deploying IP Telephony in the Enterprise Composite Network Model

    Study Tips

    Summary

    Configuration Exercise: Configuring Voice VLANs on a Catalyst Switch

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Configure Access and Voice VLAN

    Task 2: Configure Interfaces for Access and Voice VLANs

    Task 3: Configure Interface FastEthernet 0/1 Through 0/10 for a Recommended QoS Configuration for Congestion Management

    Task 4: Configure Interface FastEthernet 0/1 for a Classification Based on Trusting CoS

    Task 5: Configure Interface FastEthernet 0/2 for Classification Based on Trusting DSCP

    Task 6: Configure Interfaces FastEthernet 0/3 Through 0/10 for Trusting CoS Based on Whether an IP Phone Is Attached to the Interface

    Task 7: Verify the Voice VLAN Configuration of the FastEthernet Interfaces

    Review Questions

Chapter 14                Implementing Management and Data Plane Security Features on Cisco Catalyst Switches

    Catalyst Switch Configurations for Security in Multilayer Switched Networks

    Configuring Strong System Passwords

    Restricting Management Access Using Access Control Lists

    Securing Physical Access to the Console

    Securing Access to vty Lines

    Configuring System Warning Banners

    Disabling Unneeded or Unused Services

    Trimming and Minimizing Use of CDP

    Disabling the Integrated HTTP Daemon

    Configuring Basic System Logging

    Securing SNMP

    Limiting Trunking Connections and Propagated VLANs

    Securing the Spanning-Tree Topology

    Configuring AAA

    Authentication

    Authorization

    Accounting

    Configuring AAA Authentication

    Configuring AAA Authorization

    Configuring AAA Accounting

    A Step-by-Step Example of Configuring Cisco AAA on a Cisco IOS-Based Catalyst Switch

    Additional Resources for Understanding and Configuring AAA

    Port Security

    Allowing Traffic Based on Host MAC Addresses

    Restricting Traffic Based on Host MAC Addresses

    Blocking Unicast Flooding on Desired Ports

    Port Security Summary

    Network Access Security Using IEEE 802.1X

    Configuring IEEE 802.1X

    Applying Security Using Access Control Lists

    RACLs

    VACLs

    Port ACLs

    Securing Networks Using Firewalls

    Security Through Network Address Translation (NAT)

    DHCP Snooping

    IP Source Guard

    Configuring IPSG

    Dynamic ARP Inspection

    Understanding the Role of Private VLANs as a Security Feature

    Understanding the Role of QoS as a Security Feature

    Case Study: Understanding and Preventing VLAN Hopping Attacks

    Study Tips

    Summary

    Configuration Exercise 1: AAA, 802.1X, and VACLs

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Enable AAA, Disable Telnet, and Enable SSH

    Task 2: Configure AAA Authentication for VTY Access Using RADIUS and the Local Username and Password Database if the Radius

    Server Is Unavailable

    Task 3: Configure 802.1X on a Per-Interface Basis

    Task 4: Configure VACL to Drop All Ingress Frames on TCP Port 8889

    Configuration Exercise 2: Securing a Cisco Multilayer Switched Network Using DHCP Snooping, IPSG, and DAI

    Required Resources

    Exercise Objective

    Network Diagram

    Command List

    Task 1: Enable DHCP Snooping

    Task 2: Verify DHCP Snooping, IPSG, and DAI Status

    Task 3: Simulate an IP Source Guard and DAI Violation

    Review Questions

Chapter 15                Introduction to the Catalyst Switching Architectures

    Catalyst 6500

    Catalyst 6500 Supervisor Engine I

    Catalyst 6500 with Supervisor Engine II

    Catalyst 6500 with Supervisor Engine 720

    Catalyst 6500 Modules

    Catalyst 6500 Service Modules

    Catalyst 6500 Summary

    Catalyst 4500

    Catalyst 3750

    Catalyst 3560

    Catalyst 3550

    Catalyst 2950

    Study Tips

    Summary

    Review Questions

Chapter 16                Designing, Building, and Connecting Cisco Multilayer Switched Networks Using Metro Solutions

    Introduction to Cisco Metro Solutions

    Metro Ethernet

    Metro Ethernet Connectivity and Transport

    Metro Ethernet over SONET

    Metro Ethernet over Wave Division Multiplexing Optical Solutions

    Optical Distance Challenges

    Summary

    Review Questions

Chapter 17                Performance and Connectivity Troubleshooting Tools for Multilayer Switches

    Techniques to Enhance Performance

    Monitoring Performance with SPAN and VSPAN

    Using SPAN to Monitor the CPU Interface of Switches

    Monitoring Performance with RSPAN

    Monitoring Performance Using VACLs with the Capture Option

    Troubleshooting Using L2 Traceroute

    Performance Monitoring Using the Network Analysis Module in the Catalyst 6500 Family of Switches

    Verification of the NAM Configuration

    Troubleshooting Common Problems with the NAM

    Study Tips

    Summary

    Review Questions

Appendix A                In-Depth Review of 802.3u and 802.3ad Auto-Negotiation

Appendix B                Answers to Review Questions

Appendix C                Introduction to Storage Networking (Only Available Online at ciscopress.com)

1587052199TOC91405

Appendix

Download - 396 KB - Appendix C: Introduction to Storage Networking

Index

Download - 89 KB -- Index

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020