Caleb Sargeant's Docs
latest
Networking
Cisco
Core Security
Routing
Switching
Core Concepts and Design
VLANs
STP
Etherchannel
L3 Switching
HSRP, VRRP, and GLBP
Campus Security
Campus VoIP
Wireless LAN
The Switch’s Domain
Monitoring
General
MPLS
NGFW & NGIPS
DevNet Day
ACI
ASA
ASAv
DNA
General
Genie
ISE
Nexus
NSO
VIRL
Mikrotik
FortiGate
HP Procurve
Juniper
Ubiquiti UniFi
NetDevOps Tool Chest
Computing
Ansible
Bamboo
Cloud
Docker
Kubernetes
DNS
ELK Stack
Jenkins
Linux
Pentesting
Terraform
Microsoft
Programming
Bash
Python
Other
API
General
iPerf3
Caleb Sargeant's Docs
Docs
»
Cisco
»
Switching
Edit on GitHub
Switching
¶
Core Concepts and Design
Plug and play switches
Enterprise Composite Network Model
VLANs
Designing the Network
The Two Flavours of CISCO Switches
VLANs
Configuration and Verification
VLAN Foundations
Local VLANs
Configuring VLANs
Deleting VLAN Database
In-Depth Trunking
Trunking
The Two Tagging Flavours
Digging Deeper Into the Trunk
Negotiating Trunking
Configuring Trunk Ports
VLAN Trunking Protocol
VTP Modes
VTP Pruning
Configuring VTP
Common VLAN problems
STP
STP - Foundation per-VLAN Spanning Tree Concepts
The Facts About Spanning Tree
Understanding BPDUs and Elections
How STP Finds the Best Path
Initial Enhancements: Per VLAN Spanning Tree
The Spanning-Tree Command
Problems with Spanning-Tree
Rapid Spanning Tree Concepts and Configuration
Problems and Solutions
Rapid STP Port States
Rapid STP Port Roles
Why RSTP is Better
Configuring RSTP
Etherchannel
Two Negotiating Protocols
Configuring EtherChannel
Layer 2 EtherChannel
Layer 3 EtherChannel
Best Practices
L3 Switching
Router on a stick (802.1Q/ISL)
Multi-Layer Switching
Understanding Layer 3 vs Multilayer Switching
Layer 3 Routing vs Layer 3 Switching
Exceptions to CEF
Verifying CEF Processing
HSRP, VRRP, and GLBP
Redundancy Considerations
HSRP vs VRRP vs GLBP
HSRP
HSRP Base Configuration
Tuning and Optimizing HSRP
VRRP
VRRP Configuration
GLBP
GLBP Configuration
Campus Security
Basic Port Security and 802.1x
Port Security on Catalyst Switches
Identity-Based Network Services (IBNS)
VLAN and Spoofing Attacks
Preventing VLAN Hopping Attacks
Private VLANs
Setting up Private VLANs
Man in the Middle Attacks
STP Attacks and Other Security Considerations
Spanning Tree Manipulation
Cisco Switches Best Practices
VACLs
The Switch ACL: VACLs
Campus VoIP
Why an Organization Would use IPT
Phase One IP Telephony Migration
Phase Two IP Telephony Migration
Campus Issues to Power when Deploying VOIP
Understanding and Configuring Dual VLANs
Understanding and Configuring QoS
Wireless LAN
Foundation Concepts and Design
Types of Wireless Networks
Wireless LAN Facts
Understanding the SSID
Correct Design of a WLAN
Client Roaming
Two Flavors or Roaming
How a Client Roams
Wireless VLAN Support
Frequencies and 802.11 Standards
Unlicensed Frequencies
Understanding RF
The 802.11 Lineup
Wireless Range
Wireless LAN Security
Understanding the Hardware
Understanding the AP Categories
Understanding Lightweight Access Points
Wireless LAN Controllers
Cisco Wireless Indoor Access Points
Power Over Ethernet
Understanding Antennas
The Switch’s Domain
Understanding Loopguard
Understanding UDLD
Supervisor Redundancy Mechanisms
Designing the Network
Monitoring
Implementing Syslog
Understanding SNMP
Understanding IP SLA
General
AAA
RADIUS
Health
Factory Default Settings
IOS Upgrade
Isolating Guest Network