CCNA Explorer 3 Basic Switch Concepts and Configuration

From Teknologisk videncenter
Revision as of 10:06, 19 August 2010 by Rael (talk | contribs)
Jump to: navigation, search
CSMA/CD on a multi-access half-Dublex network
  • 1. Carrier Sense
  • 2. Collision Detection
  • 3. Jam Signal
  • 4. Random Backoff
Difference between Unicast, Multicast and Broadcast
IEEE 802.3 Ethernet frame
Mac address format
Duplex settings
MAC table population step 1
MAC table population step 2
MAC table population step 3
MAC table population step 4
Collision Domain
Network Latency
Broadcast Domain
Collision Domain
Removing Server Bottlenecks
Switch Packet Forwarding Methods
  • Store-and-Forward - Gemmer pakken og tjekker for crc fejl
  • Cut-Through Switching - Switcher pakken når den har læst destinationen
    • Fast-forward - Switcher pakken med det samme den har læst destinationen
    • Fragment-free - Læser de første 64 byte og sender videre.
Symmetric vs. Asymmetric Switching
L2 and L3 Switching
L3 Switch and Router comparison

Navigating Command-Line Interfaces Modes

EXEC modes
Navigation configuration modes
Context Sensitive Help
Console Error Messages
Command history buffer
Configure the Command History Buffer
Switch Boot Sequence
Rollover cable
Hyperterminal
Watch boot sequence
Configure IP connectivity Step 1
Configure IP connectivity Step 2
Verify IP Connectivity
Configuring Duplex and Speed
Kommet hertil
Configure web interface
show mac address-table
Create static MAC entry: mac-address-table static <MAC address> vlan {1-4096, ALL} interface interface-id
Show Commands
Show Commands
Backup configuration
Restore configuration
Backup to TFTP server
Erase nvram:
Filsystem prefixer
Configure console access
Configure VTY access
EXEC mode password
Configure encypted passwords
Password recovery
Banner login
Banner motd
Telnet & SSH
Transport input telnet
Transport input SSH

Common Security Attacks

MAC Address Flooding

MAC flooding attack step 1
MAC flooding attack step 2
MAC flooding attack step 3
MAC flooding attack step 4
MAC flooding attack step 5

DHCP Spoofing

DHCP Spoofing
CDP Attack
Telnet Attack
Security Tools
Switchport Security
Switchport Security configuration
Verify port security
Secure Unused Ports

Kommet til 2.4.1