Training Courses : IT PROFESSIONALS : CISCO : CISCO Routing and Switching

Training Courses
CCNA3: Scaling Networks

Code: CISCO.CCNA3
Type: IT InstructorLed Courses
Category: CISCO Routing and Switching

The course aims to provide the knowledge, skills and competences to students in order to setup and support network switches. It focuses on advanced IP addressing techniques (Variable Length Subnet Masking [VLSM]), intermediate routing protocols (RIP v2, single-area OSPF, EIGRP), command-line interface configuration of switches, Ethernet switching, Virtual LANs (VLANs), Spanning Tree Protocol (STP), and VLAN Trunking Protocol (VTP). Particular emphasis is given to students being able to demonstrate the ability to apply learnings from CCNA 1 and 2 to a network and to be able to explain how and why a particular strategy is employed.



Duration: 48
Location: EDITC & MMC Conference Center, 16 Imvrou Street, 1055 Nicosia
Language: English or Greek
 

Topics

Unit 1 Introduction to Scaling Networks
Introduction
Implementing a Network Design

    Hierarchical Network Design
        The Need to Scale the Network
        Enterprise Business Devices
        Hierarchical Network Design
        Cisco Enterprise Architecture
        Failure Domains
 Expanding the Network
        Design for Scalability
        Planning for Redundancy
        Increasing Bandwidth
        Expanding the Access Layer
        Fine-tuning Routing Protocols
Selecting Network Devices
        Switch Hardware
        Switch Platforms
        Port Density
        Forwarding Rates
        Power over Ethernet
        Multilayer Switching
Router Hardware
        Router Requirements
        Cisco Routers
        Router Hardware
 Managing Devices
        Managing IOS Files and Licensing
        In-Band Versus Out-of-Band Management
        Basic Router CLI Commands
        Basic Router show Commands
        Basic Switch CLI Commands
        Basic Switch show Commands
Summary
Practice
         Class Activities
         Labs
         Packet Tracer Activities
         Check Your Understanding Questions


Unit 2 LAN Redundancy
Introduction
Spanning Tree Concepts
Purpose of Spanning Tree
        Redundancy at OSI Layers 1 and 2
        Issues with Layer 1 Redundancy: MAC Database Instability
        Issues with Layer 1 Redundancy: Broadcast Storms
        Issues with Layer 1 Redundancy: Duplicate Unicast Frames
STP Operation
        Spanning Tree Algorithm: Introduction
        Spanning Tree Algorithm: Port Roles
        Spanning Tree Algorithm: Root Bridge
        Spanning Tree Algorithm: Path Cost
        802.1D BPDU Frame Format
        BPDU Propagation and Process
        Extended System ID
Varieties of Spanning Tree Protocols
        Overview
        List of Spanning Tree Protocols
        Characteristics of the Spanning Tree Protocols
 PVST+
        Overview of PVST+
        Port States and PVST+ Operation
        Extended System ID and PVST+ Operation

Rapid PVST+
        Overview of Rapid PVST+
        RSTP BPDU
        Edge Ports
        Link Types
Spanning Tree Configuration
        PVST+ Configuration
        Catalyst 2960 Default Configuration
        Configuring and Verifying the Bridge ID
        PortFast and BPDU Guard
        PVST+ Load Balancing
        Rapid PVST+ Configuration
        Spanning Tree Mode
STP Configuration Issues
        Analyzing the STP Topology
        Expected Topology Versus Actual Topology
        Overview of Spanning Tree Status
        Spanning Tree Failure Consequences
        Repairing a Spanning Tree Problem
First Hop Redundancy Protocols
        Concept of First Hop Redundancy Protocols
        Default Gateway Limitations
        Router Redundancy
        Steps for Router Failover
        Varieties of First Hop Redundancy Protocols
        First Hop Redundancy Protocols
FHRP Verification
        HSRP Verification
        GLBP Verification
        Syntax Checker – HSRP and GLBP
Summary
Practice
          Class Activities
          Labs
          Packet Tracer Activities
          Check Your Understanding Questions


Unit 3 LAN Aggregation
Objectives
Key Terms
Introduction
Link Aggregation Concepts
        Link Aggregation
        Introduction to Link Aggregation
        Advantages of EtherChannel
EtherChannel Operation
        Implementation Restrictions
        Port Aggregation Protocol
        Link Aggregation Control Protocol
Link Aggregation Configuration
        Configuring EtherChannel
        Configuration Guidelines
        Configuring Interfaces

Verifying and Troubleshooting EtherChannel
        Verifying EtherChannel
        Troubleshooting EtherChannel
Summary
Practice
        Class Activities
         Labs
         Packet Tracer Activities
         Check Your Understanding Questions


Unit 4 Wireless LANs
Objectives
Key Terms
Introduction
Wireless Concepts
        Introduction to Wireless
        Supporting Mobility
        Benefits of Wireless
        Wireless Technologies
        Radio Frequencies
        802.11 Standards
        Wi-Fi Certification
Comparing WLANs to a LAN
        Components of WLANs
        Wireless NICs
        Wireless Home Router
        Business Wireless Solutions
        Wireless Access Points
        Small Wireless Deployment Solutions
        Large Wireless Deployment Solutions
        Wireless Antennas
        802.11 WLAN Topologies
802.11 Wireless Topology Modes
        Ad Hoc Mode
        Infrastructure Mode
        Wireless LAN Operations
802.11 Frame Structure
        Wireless 802.11 Frame
        Frame Control Field
        Wireless Frame Type
        Management Frames
        Control Frames
Wireless Operation
        Carrier Sense Multiple Access with Collision Avoidance
        Wireless Clients and Access Point Association
        Association Parameters
        Discovering APs
        Authentication
    Channel Management
        Frequency Channel Saturation
        Selecting Channels
        Planning a WLAN Deployment
Wireless LAN Security
        WLAN Threats
        Securing Wireless
        DoS Attack
        Management Frame DoS Attacks
        Rogue Access Points
        Man-in-the-Middle Attack
    Securing WLANs
        Wireless Security Overview
        Shared Key Authentication Methods
        Encryption Methods
        Authenticating a Home User
        Authentication in the Enterprise
Wireless LAN Configuration
        Configure a Wireless Router
        Configuring a Wireless Router
        Setting Up and Installing Initial Linksys EA6500
        Configuring the Linksys Smart Wi-Fi Home Page
        Smart Wi-Fi Settings
        Smart Wi-Fi Tools
        Backing Up a Configuration
        Configuring Wireless Clients
        Connecting Wireless Clients
  Troubleshoot WLAN Issues
        Troubleshooting Approaches
        Wireless Client Not Connecting
        Troubleshooting When the Network Is Slow
        Updating Firmware
Summary
Practice
         Class Activities
          Labs
          Packet Tracer Activities
Check Your Understanding Questions


Unit 5 Adjust and Troubleshoot Single-Area OSPF
Introduction
Advanced Single-Area OSPF Configurations
        Routing in the Distribution and Core Layers
        Routing Versus Switching
        Static Routing
        Dynamic Routing Protocols
        Open Shortest Path First
        Configuring Single-Area OSPF
        Verifying Single-Area OSPF
        Configuring Single-Area OSPFv3
        Verifying Single-Area OSPFv3
OSPF in Multiaccess Networks
        OSPF Network Types
        Challenges in Multiaccess Networks
        OSPF Designated Router
        Verifying DR/BDR Roles
        Verifying DR/BDR Adjacencies
        Default DR/BDR Election Process
        DR/BDR Election Process
        The OSPF Priority
        Changing the OSPF Priority
 Default Route Propagation
        Propagating a Default Static Route in OSPFv2
        Verifying the Propagated Default Route
        Propagating a Default Static Route in OSPFv3
        Verifying the Propagated IPv6 Default Route
Fine-Tuning OSPF Interfaces
        OSPF Hello and Dead Intervals
        Modifying OSPFv2 Intervals
        Modifying OSPFv3 Intervals
Secure OSPF
        Routers Are Targets
        Secure Routing Updates
        MD5 Authentication
        Configuring OSPF MD5 Authentication
        OSPF MD5 Authentication Example
        Verifying OSPF MD5 Authentication
Troubleshooting Single-Area OSPF Implementations
        Components of Troubleshooting Single-Area OSPF
        Overview
        OSPF States
        OSPF Troubleshooting Commands
        Components of Troubleshooting OSPF
 Troubleshoot Single-Area OSPFv2 Routing Issues
        Troubleshooting Neighbor Issues
        Troubleshooting OSPF Routing Table Issues
        Troubleshoot Single-Area OSPFv3 Routing Issues
        OSPFv3 Troubleshooting Commands
        Troubleshooting OSPFv3
Summary
 Practice
         Class Activities
         Labs
         Packet Tracer Activities
         Check Your Understanding Questions


Unit 6 Multiarea OSPF
Introduction
Multiarea OSPF Operation

        Why Multiarea OSPF?
        Single-Area OSPF
        Multiarea OSPF
        OSPF Two-Layer Area Hierarchy
        Types of OSPF Routers
Multiarea OSPF LSA Operation
        OSPF LSA Types
        OSPF LSA Type 1
        OSPF LSA Type 2
        OSPF LSA Type 3
        OSPF LSA Type 4
        OSPF LSA Type 5
        OSPF Routing Table and Types of Routes
        OSPF Routing Table Entries
        OSPF Route Calculation
Configuring Multiarea OSPF
        Configuring Multiarea OSPFv2 and OSPFv3
        Implementing Multiarea OSPF
        Configuring Multiarea OSPF
        Configuring Multiarea OSPFv3
 OSPF Route Summarization
        OSPF Route Summarization
        Interarea and External Route Summarization
        Interarea Route Summarization
        Calculating the Summary Route
        Configuring Interarea Route Summarization
 Verifying Multiarea OSPF
        Verifying Multiarea OSPF
        Verify General Multiarea OSPF Settings
        Verify the OSPF Routes
        Verify the Multiarea OSPF LSDB
        Verify Multiarea OSPFv3
Summary
Practice
       Class Activities
       Labs
       Packet Tracer Activities
       Check Your Understanding Questions


Unit 7 EIGRP
Introduction
Characteristics of EIGRP
    Basic Features of EIGRP
        Features of EIGRP
        Protocol-Dependent Modules
        Reliable Transport Protocol
        Authentication
 Types of EIGRP Packets
        EIGRP Packet Types
        EIGRP Hello Packets
        EIGRP Update and Acknowledgment Packets
        EIGRP Query and Reply Packets
        EIGRP Messages
        Encapsulating EIGRP Messages
        EIGRP Packet Header and TLV
Configuring EIGRP for IPv4
        Configuring EIGRP with IPv4
        EIGRP Network Topology
        Autonomous System Numbers
        The Router EIGRP Command
        EIGRP Router ID
        Configuring the EIGRP Router ID
        The network Command
        The network Command and Wildcard Mask
        Passive Interface
  Verifying EIGRP with IPv4
        Verifying EIGRP: Examining Neighbors
        Verifying EIGRP: show ip protocols Command
        Verifying EIGRP: Examine the IPv4 Routing Table
Operation of EIGRP
        EIGRP Initial Route Discovery
        EIGRP Neighbor Adjacency
        EIGRP Topology Table
        EIGRP Convergence
 Metrics
        EIGRP Composite Metric
        Examining Interface Values
        Bandwidth Metric
        Delay Metric
        How to Calculate the EIGRP Metric
        Calculating the EIGRP Metric
DUAL and the Topology Table
        DUAL Concepts
        Introduction to DUAL
        Successor and Feasible Distance
        Feasible Successors, Feasibility Condition, and Reported
        Distance
        Topology Table: show ip eigrp topology Command
        Topology Table: show ip eigrp topology Command (Cont.)
        Topology Table: No Feasible Successor
 DUAL and Convergence
        DUAL Finite State Machine (FSM)
        DUAL: Feasible Successor
        DUAL: No Feasible Successor
Configuring EIGRP for IPv6
        EIGRP for IPv4 Versus IPv6
        EIGRP for IPv6
        Comparing EIGRP for IPv4 and IPv6
        IPv6 Link-Local Addresses
        Configuring EIGRP for IPv6
        EIGRP for IPv6 Network Topology
        Configuring IPv6 Link-Local Addresses
        Configuring the EIGRP for IPv6 Routing Process
The ipv6 eigrp Interface Command
        Verifying EIGRP for IPv6
        Verifying EIGRP for IPv6: Examining Neighbors
        Verifying EIGRP for IPv6: show ipv6 protocols Command
        Verifying EIGRP for IPv6: Examine the IPv6 Routing Table
Summary
Practice

       Class Activities
       Labs
       Packet Tracer Activities
       Check Your Understanding Questions


Unit 8 EIGRP Advanced Configurations and Troubleshooting
Objectives
Key Terms
Introduction

Advanced EIGRP Configurations
        Automatic Summarization
        Network Topology
        EIGRP Automatic Summarization
        Configuring EIGRP Automatic Summarization
        Verifying Auto-Summary: show ip protocols
        Verifying Auto-Summary: Topology Table
        Verifying Auto-Summary: Routing Table
        Summary Route
        Summary Route (Cont.)
Manual Summarization
        Manual Summary Routes
        Configuring EIGRP Manual Summary Routes
        Verifying Manual Summary Routes
        EIGRP for IPv6: Manual Summary Routes
Default Route Propagation
        Propagating a Default Static Route
        Verifying the Propagated Default Route
        EIGRP for IPv6: Default Route
Fine-Tuning EIGRP Interfaces
        EIGRP Bandwidth Utilization
        Hello and Hold Timers
        Load-Balancing IPv4
        Load-Balancing IPv6
Secure EIGRP
        Routing Protocol Authentication Overview
        Configuring EIGRP with MD5 Authentication
        EIGRP Authentication Example
        Verify Authentication
Troubleshoot EIGRP
        Components of Troubleshooting EIGRP
        Basic EIGRP Troubleshooting Commands
        Components
Troubleshoot EIGRP Neighbor Issues
        Layer 3 Connectivity
        EIGRP Parameters
        EIGRP Interfaces
Troubleshoot EIGRP Routing Table Issues
        Passive Interface
        Missing Network Statement
        Automatic Summarization
Summary
Practice

    Class Activities
    Labs
    Packet Tracer Activities
    Check Your Understanding Questions


Unit 9 IOS Images and Licensing
Introduction
Managing IOS System Files

        Naming Conventions
        Cisco IOS Software Release Families and Trains
        Cisco IOS Release 12.4 Mainline and T Trains
        Cisco IOS Release 12.4 Mainline and T Numbering
        Cisco IOS Release 12.4 System Image Packaging
        Cisco IOS Release 15.0 M and T Trains
        Cisco IOS Release 15 Train Numbering
        IOS Release 15 System Image Packaging
        IOS Image Filenames
Managing Cisco IOS Images
        TFTP Servers as a Backup Location
        Creating a Cisco IOS Image Backup
        Copying a Cisco IOS Image
        Boot System
IOS Licensing
        Software Licensing
        Licensing Overview
        Licensing Process
        Step 1. Purchase the Software Package or Feature to Install
        Step 2. Obtain a License
        Step 3. Install the License
 License Verification and Management
        License Verification
        Activate an Evaluation Right-To-Use License
        Back Up the License
        Uninstall the License
Summary
Practice

    Class Activities
    Packet Tracer Activities
    Check Your Understanding Questions



Who Should Attend
  • Network technicians
  • Network engineers
  • Network administrators
  • Network help-desk staff


Objectives

CCNA 3 is an integral step towards achieving CCNA Certification. Upon completion of this course, students will be able to perform tasks related to:

  • Variable Length Subnet Masking (VLSM)
  • Intermediate routing protocols (RIP v2, single-area OSPF, EIGRP)
  • Switching Concepts
  • Switches
  • Switch Configuration
  • Spanning Tree Protocol (STP)
  • Virtual LANs (VLANs)
  • VLAN Trunking Protocol (VTP)


Methodology
  • Διάλεξη με διαφάνειες
  • Συζήτηση
  • Ασκήσεις
  • Προβολή ταινίας
  • Παραδείγματα
  • Επίδειξη
  • Εργαστήρια




Find Training Courses
Name
Type
v
Category
v
 

© EDUCATION & INFORMATION TECHNOLOGY CENTRE (EDITC). All Rights Reserved. Developed by CMP POLYMEDIA LTD