[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] sample tests 2nd 3rd answer keys 2nd scalability MANs (metropolitan area networks) Ethernet considerations unicasting and security Catalyst switches 802.1X authentication 2nd 3rd 4th AAA 2nd components 2nd configuring 2nd configuring AAA accounting 2nd 3rd configuring AAA authentication 2nd 3rd configuring AAA authorization 2nd enabling AAA 2nd 3rd port security 2nd 3rd 4th 5th VACLs activating 2nd configuring 2nd segments (networks) designated ports and switches serialization (IP telephopny) Server Farm module campus intranets 2nd Server Load Balancing. [See SLB] service level (MANs) Ethernet considerations service password-encryption command switch configuration Service Provider Edge module services Catalyst switch security SEs (Supervisor Engines) Catalyst switches Route Processor Redundancy Route Processor Redundancy events 2nd Route Processor Redundancy features Route Processor Redundancy Plus 2nd Route Processor Redundancy Plus configuration 2nd 3rd Route Processor Redundancy Plus guidelines 2nd 3rd set spantree bpdu-skewing command SFM (Switch Fabric Module) configuring 2nd features 2nd 3rd shaping traffic shared access (access layer) shared distribution trees multicasts 2nd shared environments unicast packets Shared Spanning Tree. [See PVST] show commands switches troubleshooting show interface switchport command trunk configuration show interface trunk command trunk configuration show interfaces command show ip pim interface command show ip pim neighbor command show ip protocols command show ip route command show mac-address-table command show module command NAM (Network Analysis Module) show port security command show power command show redundancy command show running-config interface command FastPort configuration trunk configuration show spanning tree command show spanning-tree summary command BPDU Guard FastPort configuration show vlan command SLB (Server Load Balancing) 2nd configuring 2nd 3rd 4th operation of 2nd SNMP Catalyst switch security NAM (Network Analysis Module) configuration commands snmp commands NAM (Network Analysis Module) SONET Ethernet over 2nd 3rd redundancy mechanism SONET (Synchronous Optical Network) source filtering (IGMPv3 multicasting) source-based distribution trees multicasts 2nd source-specific addresses multicasting SPAN (Switched Port Analyzer) 2nd configuration verification 2nd configuring 2nd 3rd 4th types Spanning Tree Protocol. [See STP] spanning-tree portfast command spanning-tree uplinkfast command sparse mode protocols multicast routing 2nd speaking state (HSRP state) SRM (Single Router Mode) redundancy 2nd advantages configuring 2nd operation of 2nd overview 2nd SSH Catalyst switch security standby command standby RP (HSRP) role of standby state (HSRP state) static VLANs 2nd sticky learning port security STP Catalyst switch security configuring enabling/disabling 2nd path selection 2nd port cost 2nd 3rd port priority root switch selection 2nd 3rd verification 2nd MANs (metropolitan area networks) 2nd 3rd 4th STP (Spanning Tree Protocol) advantages BackboneFast feature 2nd 3rd 4th enabling nonconnected interfaces BDPU (Bridge Protocol Data Unit) and 2nd BPDU skewing 2nd convergence time CST and 2nd features Loop Guard 2nd compared to UDLD 2nd MST and 2nd 3rd network topology changes preventing staggered convergence operation bridging loops designated port and switch resolution 2nd overview port states 2nd 3rd root port selection 2nd root switch election 2nd overview 2nd PortFast feature BPDU filtering 2nd BPDU Guard configuring 2nd operation 2nd PVST 2nd PVST+ RootGuard 2nd 3rd 4th switches disabling loops timer values timers changing values 2nd troubleshooting steps to take 2nd types of problems 2nd types of UDLD (Unidirectional Link Detection) 2nd 3rd 4th UplinkFast feature 2nd 3rd 4th strategies test-taking 2nd 3rd question handling 2nd 3rd subinterfaces creating 2nd SVI interfaces switch interface internal PRs routing configuration 2nd 3rd 4th types 2nd 3rd switched access (access layer) switched environments unicast packets switched networks Layer 2 VLANs Switched Port Analyzer. [See SPAN] switches advantages of BackboneFast (STP) 2nd 3rd 4th enabling nonconnected interfaces BDPUs and STP 2nd CAM tables automatically updating 2nd campus intranets 2nd 3rd 4th 5th Catalyst 802.1X authentication 2nd 3rd 4th AAA 2nd configuring AAA accounting 2nd 3rd configuring AAA authentication 2nd 3rd configuring AAA authorization 2nd debug commands 2nd enabling AAA 2nd 3rd NAM (Network Analysis Module) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th port security 2nd 3rd 4th 5th powering IP telephony redundancy capabilities of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th security components 2nd security setup 2nd SPAN (Switched Port Analyzer) 2nd 3rd 4th 5th 6th 7th CLI (command-line interface) CatOS compared to IOS 2nd 3rd 4th configuration 2nd converting CatOS to IOS 2nd 3rd sample configuration 2nd 3rd 4th viewing configuration files 2nd CST (Common Spanning Tree) 2nd designated port and switch resolution 2nd forwarding and filtering frames 2nd identifiers IP addresses assigning to Layer 2 redundancy 2nd MANs (metropolitan area networks) list of Cisco solutions 2nd MST (Multiple Spanning Tree) IST and 2nd 3rd 4th multicasting CGMP traffic control protocol 2nd 3rd IGPM snooping traffic control methods 2nd multilayer campus intranets PVST 2nd PVST+ root election by STP 2nd timer control by root port selection 2nd RSTP behavior in an STP network SFM configuring 2nd features 2nd 3rd STP bridging loops configuring enabling/disabling 2nd path selection 2nd port cost 2nd 3rd port priority root switch selection 2nd 3rd verification 2nd STP (Spanning Tree Protocol) overview 2nd TCNs (topology change notifications) transparent loop elimination troubleshooting 2nd 3rd UDLD (Unidirectional Link Detection) 2nd 3rd 4th UplinkFast (STP) VLANs adding 2nd 3rd switches. [See also transparent bridges] switching architecture centralized 2nd distributed 2nd NetFlow switching 2nd processor and ASIC switching 2nd route caching topology-based 2nd Layer 2 principles of operation MLS CEF CEF configuration 2nd CEF example 2nd CEF limitations 2nd CEF load balancing 2nd CEF operation 2nd 3rd CEF tables 2nd 3rd CEF troubleshooting 2nd CEF verfication 2nd 3rd 4th principles of operation 2nd rewriting frame and packet contents 2nd TCAM tables 2nd 3rd traffic handling 2nd switchport access vlan command switchport mode access command switchport native command switchport trunk allowed command switchport trunk encapsulation command |