(C)We Want to Hear from You s2
Total Page:16
File Type:pdf, Size:1020Kb
Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide First Edition
Copyright © 2015 Cisco Systems, Inc.
ISBN-10: 1-58720-664-1 ISBN-13: 978-1-58720-664-1
Warning and Disclaimer
Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it.
When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing.
First Printing: May 2015
Corrections for February 3, 2016
Pg Error – Second Printing Correction 14 Chapter 2, Third Paragraph, First Sentence Should read: Reads: In addition, the distribution layer optionally In addition, the distribution layer optionally provides provides default gateway redundancy by default gateway redundancy by using a first-hop using a first-hop routing protocol (FHRP) routing protocol (FHRP) such as Hot Standby Routing such as Host Standby Routing Protocol Protocol (HSRP),….. (HSRP),…..
Updated 02/03/2016 32 Chapter 2, Figure 2-18, Second Box at Should read: Bottom
Reads: Distributed FIB Distribute FIB 97 Errata Correction: Chapter 3, LACP, First Should read: Paragraph, First Sentence
Reads: Link Aggregation Control Protocol (LACP) is part of an Link Aggregation Control Protocol (LACP) is IEEE specification (802.1AX and 802.1aq) that allows now part of 802.1AX and 802.1aq (latest several physicals ports….. version 2015) that allows several physicals ports….. 115 Chapter 3, Add Sentence to Question 23 Sentence to add: Newer versions of IOS have changed the configuration commands for VTP and this question no longer properly quizzes VTP. 454 Chapter 10, Insert Note Right Before Note to Add: PVLAN configuration NOTE VTP3 version 3 supports PVLAN. 264 Chapter 6, Figure 6-15, Remove Last Line to remove: Config Line Switch2 (config-if)# standby 20 preempt 264 Errata Correction: Chapter 6, Example 6- Line to remove: 1, Remove Seventh config line Switch1 (config-if)# standby 10 preempt 265 Chapter 6, Figure 6-16, Remove Seventh Line to remove: Config Line Switch2 (config-if)# standby 10 preempt 265 Errata Correction: Chapter 6, Example 6- Line to remove: 2, Remove Last Config Line Switch2 (config-if)# standby 20 preempt
Updated 02/03/2016 271 Chapter 6, Configuring HSRP Should read: Authentication, Fourth Paragraph
Reads: To confgure MD5 authentication, use the following To configure MD5 authentication, use the interface configuration command on the HSRP peers following interface configuration command as shown below for HSRP group: on HSRP peers: Switch(config-if)# standby group-number authentication md5 key- Switch(config-if)# standby group authentication md5 string [ 0 | 7 ] string key-string [0 | 7] sting
284 ERRATA Correction: Chapter 6, First Should read: Paragraph, Sixth Sentence
Reads: The GLBP timers can be adjusted with the glbp group The GLBP timers can be adjusted with the timers [msec] hellotime [msec] holdtime command. glbp group timers [msec] hellotime [msec] holdtime [msec] holdtime command.
Corrections for January 18, 2016
Pg Error – Second Printing Correction 4 Chapter 1, Figure 1-1, (two places) Should read: Abbreviation for Start-of-frame delimiter SOF ‘SFD’ 55 Chapter 3, Table 3-3, VLAN Range for Should read: 1006-1024 Range Usage
Reads: Reserved for system use only. You cannot see or use Reserved for system use only. You cannot these VLANs. see or use these VLANS.
Updated 02/03/2016 55 Chapter 3, Table 3-3, VLAN Range, 1025- Should read: 4094, Propagated via VTP, Second Sentence Reads: The switch must be in VTP transparent mode to The switch must be in VTP transparent configure extended-range VLANs. mode to configure extended-range VLANS. 74 Chapter 3, First Bullet Should read: Reads: . Extended VLAN support: VTP also can . Extended VLAN support: VTP also can be used to be used to propagate VLANs with propagate VLANs with numbers 1017-4094 (1006- numbers 1017-4094 (1006-1017 and 1017 and 4095-4096 are reserved). 4095-2096 are reserved). 77 Chapter 3, Advertisement Requests Remove indentation
87 Chapter 3, Figure 3-20, Lower Left Side, Should read: Under Eth0/3
Reads: PC3A PC3B PC3A PC3B (VLAN20) (VLAN30) (VLAN10) (VLAN20) 97 Chapter 3, LACP, First Paragraph, First Should read: Sentence
Reads: Link Aggregation Control Protocol (LACP) is now part Link Aggregation Control Protocol (LACP) is of 802.1AX and 802.1aq (latest version 2015) that part of an IEEE specification (802.3ad) that allows several physicals ports….. allows several physicals ports….. 104 Chapter 3, First Paragraph, Second Should read: sentence Reads: You can investigate the running
Updated 02/03/2016 configuration and see that EtherChannel You can investigate the running configuration and see 1/1 and EtherChannel ½ both have had the that Ethernet 1/1 and Ethernet1/2 both have had the trunking configuration applied. trunking configuration applied. 108 Chapter 3, First Paragraph, Third Sentence Should read: Reads: In both cases, the hash function will be the In both cases, the hash function will be the same, and same, and traffic will go over the same link traffic will go over the same link (in this example, (in this example, Ethernet ½). Ethernet1/2). 111 Chapter 3, Question 8 Should Read: Reads: 8. Which statement is true for the 8. Which statements are true for the configuration of configuration of the interface in the interface in Example 3-14? Example 3-14? 111 Chapter 3, Question 8, Answer a Should read: Reads: a. The interface is a member of VLAN 5 a. The interface is a member of VLAN 5 if the interface and may negotiate to a trunk port. does negotiate to a trunk. 127 Chapter 4, Table 4-3, First Line Should read: Reads: Link Cost Link Cost 10 Gbps 1 10 Gbps 2 127 Chapter 4, Fifth Paragraph, Sixth Sentence Should read: Reads: For example, in Figure 4-6, the port For example, in Figure 4-6, the port Ethernet0/1 on Ethernet 0/1 on Switch 2 will have the port SW2 will have the port ID 128.2, the port Ethernet ID 128.1, the port Ethernet 0/3 will have 0/3 will have port ID 128.3. port ID 128.3, and so on.
Updated 02/03/2016 128 Chapter 4, First and Second Bullets Should read: Read: . Lowest root BID . Lowest root path cost to root bridge . Lowest root path cost to root bridge . Lowest root BID
129 Chapter 4, Table 4-4, Duration of State for Should read: Forwarding
Reads: Undefined (as long as there is no loop) Undefined (as long as there is a loop) 134 Chapter 4, Figure 4-11, Two Left Arrows Two Left Arrows Should be pointing Up Point Down
Arrow from SW1 to SW2 and Arrow from Arrow from SW1 to SW2 should be pointing Up, Arrow SW2 to SW4 from SW2 to SW4 should be pointing Up 139 Chapter 4, Example 4-1, Last Interface, Should read: Last Prio.Nbr
Reads: 128.3 128.2 146 Chapter 4, Second Paragraph, First and Should read: Second Sentences
Reads: As shown in Figure 4-16, Ethernet 0/1 and Ethernet As shown in Figure 4-16, Ethernet 0/1 and 0/2 of SW3 have the same interface STP cost to the Ethernet 0/2 have the same interface STP root SW2. Ethernet 0/1 of SW3 is forwarding because cost. Ethernet 0/1 is forwarding because its sender’s port ID of Ethernet 0/1 of SW2 (128.2) is its sender’s port ID (128.2) is lower than lower than that of Ethernet 0/3 (128.4) of SW2. that of Ethernet 0/2 (128.4).
Updated 02/03/2016 146 Chapter 4, Third Paragraph, First, Second Should read: and Third Sentences
Read: Right now, Ethernet 0/1 is the root port on SW3 Right now, Ethernet 0/1 is the root port on because of the lower port priority on SW2. Ethernet SW because of the lower port priority. 0/2 of SW3 has a root priority of 128.3 and Ethernet Ethernet 0/2 has a port priority of 128.3, 0/1 of SW3 has the root priority of 128.2. Because and Ethernet 0/1 has a port priority of only the cost is changing, the port priority will not be 128.2. Because only the cost is changed, observed. the port priority will not be observed. 160 Chapter 4, Example 4-15, Fifth Command Should read: Reads: Switch# show spanning-tree totals Switch# show spanning-tree summary totals 193 Chapter 4, Example 4-33, Role and Sts for Should read: Et0/2 and Et0/3
Reads: Role Sts Role Sts ------Et0/2 Root FWD Et0/2 Altn BLK Et0/3 Altn BLK Et0/3 Root FWD 193 Chapter 4, Example 4-34, Role and Sts for Should read: Et0/2 and Et0/3
Reads: Role Sts Role Sts ------Et0/2 Root FWD Et0/2 Altn BLK Et0/3 Altn BLK Et0/3 Root FWD
Updated 02/03/2016 210 Chapter 5, Step 7, Remove Last Line Line to Remove: External Router: Advantages and Disadvantages 214 Chapter 5, SVI: Advantages and Should read: Disadvantages, Fifth Bullet Reads: . It needs a Layer 3 switch to perform inter-VLAN . It needs a Layer 3 switch to perform routing, which is more expensive (for example, inter-VLAN routing, which is more Catalyst 3560 series). expensive (for example, Catalyst 3500 series). 215 Chapter 5, Routed Ports: Advantages, Should read: Bullet Points Reads: . Routed Ports are used more for one to point links . A multilayer switch can have SV1 and to connect the datacenter or distribution blocks to routed ports in a single switch. How is the core blocks so both SV1 and Routed ports can this an advantage of a routed port? be present in the Layer 3 Switch. . Multilayer switches forward either Layer . Just like layer 3 SV1, routed ports are also 2 or Layer 3 traffic in hardware, so it hardware switched so it helps to do routing in helps to do routing faster. hardware. 240 Chapter 5, Example 5-4, Second Config Should read: Reads: Switch (dhcp-config)# options 150.10.10.1 Switch (dhcp-config)# option 150.10.10.10.1 246 Chapter 5, Remove Question 21 and Remove question and answers # 21 and renumber 22 Answers as this is a duplicate to 21 258 Chapter 6, Figure 6-9, PC1 Should read: Reads: 1. What is the MAC address to reach 1. What is the MAC address to reach 192.168.4.22? 192.168.2.44?
Updated 02/03/2016 264 Chapter 6, Example 6-1, Seventh config Should read: Reads: Switch1 (config-if)# standby preempt Switch1 (config-if)# standby 10 preempt 265 Chapter 6, Example 6-2, Last Config Line Should read: Reads: Switch2 (configif)# standby 20 preempt Switch2 (config-if)# standby 20 preempt 271 Chapter 6, Configuring HSRP Should read: Authentication, First Sentence and Command after the Second Bullet To configure plan-text authentication, use the Reads: following interface configuration command on HSRP To configure plan-text authentication, use peers for group 1: the following interface configuration Switch(config-if)# standby group authentication string command on HSRP peers: Switch(config-if)# standby group authentication string 271 Chapter 6, Configuring HSRP Should read: Authentication, After the Fifth Paragraph, Command Switch(config-if)# standby 1 authentication md5 key-string [0 | 7] Reads: string Switch(config-if)# standby group authentication md5 key-string [0 | 7] string 272 Chapter 6, Second Paragraph, Last Should read: Command Reads: Switch(config-if)# standby 1 authentication md5 key-chain chain- Switch(config-if)# standby group authentication md5 name key-chain chain-name
Updated 02/03/2016 272 Chapter 6, Tuning HSRP Timers, Third Should read: Paragraph Command Reads: Switch(config-if)# standby [group-number] timers [msec] hellotime Switch(config-if)# standby group-number timers [msec] holdtime [msec] hellotime [msec] holdtime standby [group- number] timers [msec] hellotime [msec] holdtime 300 Chapter 6, Example 6-4, Sixth Command Should read: Reads: S1 (config-if) # glbp 1 priority 110 S1 (config-if)# glbp 1 priority 110 301 Chapter 6, Summary, Third Paragraph, Should read: Last Sentence Reads:
You can have up to five active forwarders You can have up to four active forwarders per GLBP per GLBP group. group. 469 Appendix A, Chapter 3, Answer 8 Should read: Reads: 8. A 8. A and C 470 Appendix A, Chapter 5, Answer 7 Should read: Reads: 7. B and E 7. B and F 471 Appendix A, Chapter 5, Answer 21 Remove Answer 21 and renumber 22 to 21
Updated 02/03/2016 Corrections for November 13, 2015
Pg Error – First Printing Correction 283 Chapter 6, Title Should read: Reads: Comparing GLPB to HSRP Comparing GLBP to HSRP 284 Chapter 6, First Paragraph, Sixth Sentence Should read: Reads: The GLBP timers can be adjusted with the The GLBP timers can be adjusted with the glbp group glbp group timers [msec] hellotime timers [msec] hellotime [msec] holdtime [msec] [msec] holdtime glbp group timers holdtime command. [msec] hellotime [msec] holdtime [msec] holdtime command.
Corrections for August 7, 2015
Pg Error – First Printing Correction 47 Chapter 3, Last Paragraph in Section Should read: Comparison of End-to-End VLANs and Local VLANs Based on the data presented in this section, there are Reads: many reasons to implement end-to-end VLANs. Based on the data presented in this However, the problem with end-to-end VLANs is that section, there are many reasons to they become difficult to maintain as it increases the implement end-to-end VLANs. The main spanning-tree domain as well as broadcast domains. reason to implement local VLANs is Special considerations should be done when deploying simplicity. Local VLAN configures are quick end-end VLANs. and easy for small-scale networks.
Updated 02/03/2016 79 Chapter 3, Step 1 Should read: Reads: Step 1.Configure VTP on all the Step 1.Configure VTP on all the switches, Switch 1 as switches, Switch 1 and Switch 3 as client mode, Switch 3 as transparent client mode, where Switch2 as mode where as Switch2 as server mode server mode 79 Chapter 3, Step 1, Lines 6 thru 9 Should read: Reads: Switch3(config) # vtp password Cisco Switch3(config) # vtp password Cisco Switch3(config)#vtp mode client Switch3(config)#vtp mode transparent Switch3(config)#vtp domain CCNP Switch3(config)#vtp domain CCNP Switch3(config)#vtp version 1 Switch3(config)#vtp version 1
Corrections for July 7, 2015
Pg Error Correction 49 Chapter 3, Implementing a Trunk in a Should read: Campus Environment, First Paragraph, Third Sentence Reads: PC 1 in VLAN 1 can communicate with the host in PC 1 in VLAN 1 can communicate with the VLAN 1 on another switch over the single trunk link, host in VLAN 21 on another switch over the the same as host in VLAN 20 can communicate with a single trunk link, the same as host in VLAN host in another switch in VLAN 20. 20 can communicate with a host in another switch in VLAN 20.
Updated 02/03/2016 469 Appendix A, Chapter 2 Answers Should read: Reads: 1. B 1. A 2. B 2. E 3. B 3. F 4. A, B, C d 4. A, B, C 5. B 5. A 6. B 6. D 7. C 7. C – 1; B – 3; A – 2 8. A, B, C, E, F, G 8. A 9. False 9. A 10. A and C 10. C 11. B and C 11. B, C 12. E 12. C 13. C 13. B 14. C 14. B 15. A, B, D, E, F 15. A, C 16. A 16. A 17. F 17. A, C, E 18. A, B, E 18. A 19. E 19. D 20. A 20. A, B 21. B and C 21. B 22. C 22. A 23. D
Updated 02/03/2016 Corrections for June 12, 2015
Pg Error Correction 124 Chapter 4, Figure 4-3, BPDU, Ninth Column Should read: Reads: Massage Age Message Age
This errata sheet is intended to provide updated technical information. Spelling and grammar misprints are updated during the reprint process, but are not listed on this errata sheet.
Updated 02/03/2016