1.0 Operation of IP Data Networks
|1.1 Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs
1.2 Select the components required to meet a given network specification
1.3 Identify common applications and their impact on the network
1.4 Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models
1.5 Predict the data flow between two hosts across a network
1.6 Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN
2.0 LAN Switching Technologies
|2.1 Determine the technology and media access control method for Ethernet networks2.2 Identify basic switching concepts and the operation of Cisco switches
2.3 Configure and verify initial switch configuration including remote access management
2.4 Verify network status and switch operation using basic utilities such as
2.5 Describe how VLANs create logically separate networks and the need for routing between them
2.6 Configure and verify VLANs
2.7 Configure and verify trunking on Cisco switches
2.8 Identify enhanced switching technologies
2.9 Configure and verify PVSTP operation
3.0 IP Addressing (IPv4/IPv6)
|3.1 Describe the operation and necessity of using private and public IP addresses for IPv4 addressing3.2 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment3.3 Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4
3.5 Describe IPv6 addresses
4.0 IP Routing Technologies
|4.1 Describe basic routing concepts
4.2 Configure and verify utilizing the CLI to set basic Router configuration
4.3 Configure and verify operation status of a device interface
4.4 Verify router configuration and network connectivity using
4.5 Configure and verify routing configuration for a static or default route given specific routing requirements
4.6 Differentiate methods of routing and routing protocols
4.7 Configure and verify OSPF
4.8 Configure and verify interVLAN routing (Router on a stick)
4.9 Configure SVI interfaces
4.10 Manage Cisco IOS Files
4.11 Configure and verify EIGRP (single AS)
5.0 IP Services
|5.1 Configure and verify DHCP (IOS Router)
5.2 Describe the types, features, and applications of ACLs
5.3 Configure and verify ACLs in a network environment
5.4 Identify the basic operation of NAT
5.5 Configure and verify NAT for given network requirements
5.6 Configure and verify NTP as a client.
5.7 Recognize High availability (FHRP)
5.8 Configure and verify syslog
5.9 Describe SNMP v2 and v3
6.0 Network Device Security
|6.1 Configure and verify network device security features
6.2 Configure and verify Switch Port Security
6.3 Configure and verify ACLs to filter network traffic
6.4 Configure and verify ACLs to limit telnet and SSH access to the router
|7.1 Troubleshoot and correct common problems associated with IP addressing and host configurations7.2 Troubleshoot and resolve VLAN problems
7.3 Troubleshoot and resolve trunking problems on Cisco switches
7.4 Troubleshoot and resolve ACL issues
7.5 Troubleshoot and resolve Layer 1 problems
7.6 Identify and correct common network problems
7.7 Troubleshoot and resolve spanning tree operation issues
7.8 Troubleshoot and resolve routing issues
7.9 Troubleshoot and resolve OSPF problems
7.10 Troubleshoot and resolve EIGRP problems
7.11 Troubleshoot and resolve interVLAN routing problems
7.12 Troubleshoot and resolve WAN implementation issues
7.13 Monitor NetFlow statistics
7.14 TS EtherChannel problems
8.0 WAN Technologies
|8.1 Identify different WAN technologies
8.2 Configure and verify a basic WAN serial connection
8.3 Configure and verify a PPP connection between Cisco routers
8.4 Configure and verify Frame Relay on Cisco routers
8.5 Implement and troubleshoot PPPoE
CLN/CLUS-LV meet up would be awesome! Please keep me in the loop.
One of the reasons i purchased VIRL was based on your youtube videos! So hopefully you’ll keep them coming!
I still have affection for GNS3, it’s where i “grew up” in terms of Cisco. I wouldn’t have obtained my CCNA without it. But the limits of GNS3 affected my CCNP Switch studies, so I had to spend the money.. But I don’t regret the decision!
Do you know where to find any CCNP Switch-VIRL labs? (without a price tag). Just a stab in the dark on that one!
2.1.a DHCP snooping
In this segment we will cover DHCP, as well as DHCP Snooping. It seems the blueprint is remiss in mentioning DHCP in its own line item so we will briefly cover it here as you cannot have DHCP Snooping without DHCP.
DHCP is easy enough; there are only 2 requirements for it so long as you are using a single subnet, as we will do here for the sake of simplicity. The minimum requirements call for a default-router and a DHCP network for address assignment. You could establish a lease period, DNS, and many other delimiters, but they are not minimum requirements. It is a good idea to include a domain-name but usually that has already been configured.
DHCP is the Dynamic Host Configuration Protocol. It eases administration by allowing clients to broadcast for Ip addresses and a default gateway, among other parameters. A lot easier than statically configuring a bunch of windows or linux boxes in any size environment. The usual method is for a dedicated server to handle the chore, but Cisco was kind enough to include it in its routers and switches, and on it’s exams.
today, I bring you how to create Gmail account since some people still have no idea about how to build an account gmail.com guide So, today I will share with you all about how to create Gmail account.
So the first step will be to set up a DHCP server. Keep in mind the acronym DORA, dis, off, req, ack and you can easily memorize the dhcp process. Discover, Offer, Request, Acknowledge.
Option 82 or the information option is a player in the VIRL canvas. Option 82 is turned on by default and does further fact checking for validity on untrusted ports especially in the case of relays. We can avoid this by turning off option 82 at the switch, or by enabling option 82 on the access ports, the untrusted ports, however, here we will turn it off on the switch. You can find out more detail about option 82 on the internet, in fact Petr Lapukhov has a great article about it on his INE blog. Just do a search for “option 82 Petr” and that should be your first hit.
This application is implied for your PC and aides in downloading the HD recordings without buffering in high determination. tubemate for androidIt is the most downloaded application on android and iOSplatforms which offer you to watch the best quality recordings with no sort of gushing issue.
Let’s get down to configuration.
Now that we have DHCP in place and operational, we can talk about DHCP Snooping. DHCP Snooping is designed to disallow rogue DHCP servers from inhabiting your network and dishing out false Ip addresses and gateways to your clients. This is performed by establishing a trust between authorized devices and thereby building a reference database for cross checking. Remember, only untrusted connections will be leased ip addresses and assigned to the snooping database, along with their associated mac’s and vlan’s. It is vital to understand that trusted connections are established between server and switch or router and switch or switch and switch, not switch and access ports.
There are three essential items to get DHCP Snooping operational. Of course there are other options but we will discuss the minimum. They
Turn on dhcp snooping
turn on dhcp snooping for the Vlan or Vlan’s
and establish trust between the server and switch.
here we go:
You can get the desktop version of this app from the official website. whatsapp for samsung mobiles But if you want to use the android version of this app then you have to download an Android emulator such as Blue stacks