Chapter 2

hellhollowreadingΔίκτυα και Επικοινωνίες

26 Οκτ 2013 (πριν από 3 χρόνια και 7 μήνες)

63 εμφανίσεις

© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE I Chapter 6

1

Configure a Switch


LAN Switching and Wireless



Chapter 2

© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

2

Summarize the operation of Ethernet as
defined for 100/1000 Mbps LANs in the IEEE
802.3 standard


Describe the key elements of Ethernet/802.3 networks




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

3

Summarize the operation of Ethernet as
defined for 100/1000 Mbps LANs in the IEEE
802.3 standard


Describe the design considerations for Ethernet/802.3
networks




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

4

Summarize the operation of Ethernet as
defined for 100/1000 Mbps LANs in the IEEE
802.3 standard


Describe the LAN design considerations to reduce
network latency




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

5


Describe the switch forwarding methods





Explain the Functions that Enable a Switch to
Forward Ethernet Frames in a LAN

© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

6

Explain the Functions that Enable a Switch to
Forward Ethernet Frames in a LAN


Explain symmetric and asymmetric Switching




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

7

Explain the Functions that Enable a Switch to
Forward Ethernet Frames in a LAN


Describe how memory buffering works




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

8

Explain the Functions that Enable a Switch to
Forward Ethernet Frames in a LAN


Compare Layer 2 with Layer 3 switching




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

9

Configure a Switch for Operation in a Network


Describe the Cisco IOS commands used to navigate
the command
-
line



© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

10

Configure a Switch for Operation in a Network


Describe the Cisco IOS help facilities




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

11

Configure a Switch for Operation in a Network


Describe the Cisco IOS commands used to access the
command history




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

12

Configure a Switch for Operation in a Network


Describe the boot sequence of a Cisco switch




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

13

Configure a Switch for Operation in a Network


Describe how to prepare the switch to be configured




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

14

Configure a Switch for Operation in a Network


Describe how to perform a basic switch configuration




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

15

Configure a Switch for Operation in a Network


Describe how to verify the Cisco IOS configuration
using the Show command



© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

16

Configure a Switch for Operation in a Network


Describe how to manage the Cisco IOS configuration
files




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

17

Configure Basic Security on a Switch


Describe the Cisco IOS commands used to configure
password options




© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

18


Describe the Cisco IOS commands used to configure a
login banner




Configure Basic Security on a Switch

© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

19


Describe the how to configure Telnet and SSH on a
switch




Configure Basic Security on a Switch

© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

20


Describe the key switch security attacks. The
description should include, MAC address flooding,
spoofing attacks, CDP attacks, and Telnet attacks



Configure Basic Security on a Switch

© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

21


Describe how network security tools are used to
improve network security


Configure Basic Security on a Switch

© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

22


Describe why you need to secure ports on a switch

Configure Basic Security on a Switch

© 2006 Cisco Sy stems, Inc. All rights reserv ed.

Cisco Public

ITE 1 Chapter 6

23


Describe the Cisco IOS commands used to disable
unused ports


Configure Basic Security on a Switch