larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

CCNP Building Multilayer Switched Networks (BCMSN 642-812) Lab Portfolio (Cisco Networking Academy)

Premium Website

  • Sorry, this book is no longer in print.
Not for Sale
  • Description
  • Downloads
  • Sample Content
  • Updates
  • Copyright 2008
  • Edition: 1st
  • Premium Website
  • ISBN-10: 1-58713-214-1
  • ISBN-13: 978-1-58713-214-8

CCNP Building Multilayer Switched Networks (BCMSN 642-812) Lab Portfolio provides you with opportunities for hands-on practice to master the technologies necessary to design, implement, operate, and troubleshoot multilayer switched networks.

The labs reinforce your understanding of how to install, configure, monitor, and troubleshoot network infrastructure equipment to deploy state-of-the-art campus LANs. The book focuses on the selection and implementation of the appropriate Cisco® IOS® services to build reliable, scalable, multilayer-switched LANs. Other topic areas of the course include VLANs, Spanning Tree Protocol, wireless client access, minimizing service loss, and minimizing data theft in a campus network.

Those preparing for the Building Multilayer Switched Networks (BCMSN 642-812) certification exam should work through this book cover-to-cover. If you need to quickly review configuration examples, you can go directly to the relevant chapter.

CCNP Building Multilayer Switched Networks (BCMSN 642-812) Lab Portfolio includes

  • 19 Labs built to support v5 of the Building Multilayer Switched Networks course within the Cisco Networking Academy curriculum providing ample opportunity to practice.
  • 2 Challenge and Troubleshooting Labs have been added to the core curriculum to test your mastery of the topics.
  • 2 Case Studies to give you a taste of what is involved in a fully functioning switching network covering all the technologies taught in this course. Even if you do not have the actual equipment to configure these more complex topologies, it is worth reading through these labs to expand your thinking into more complex networking solutions.

David Kotfila, CCNP®, CCAI, is the director of the Cisco Networking Academy at Rensselaer Polytechnic Institute (RPI), Troy, New York.

Joshua Moorhouse, CCNP, recently graduated from Rensselaer Polytechnic Institute with a bachelor of science in computer science, where he also worked as a teaching assistant in the Cisco Networking Academy. He currently works as a network engineer at Factset Research Systems.

Christian M. Price Sr., CCNP, is an instructor in the Cisco Networking Academy at Rensselaer Polytechnic Institute in Troy, New York.

Ross Wolfson, CCIE® No. 16696, recently graduated from Rensselaer Polytechnic Institute with a bachelor of science in computer science. He currently works as a network engineer at Factset Research Systems.

Use this Lab Portfolio with:

CCNP BCMSN Official Exam Certification Guide

Fourth Edition

ISBN-10: 1-58720-171-2

ISBN-13: 978-1-58720-171-4

CCNP BCMSN Portable Command Guide

ISBN-10: 158-720-188-7

ISBN-13: 978-158720-188-2

This book is part of the Cisco Networking Academy Series from Cisco Press®. Books in this series support and complement the Cisco Networking Academy curriculum.

Table of Contents

Chapter 1 Network Requirements 1

Lab 1-1: Lab Configuration Guide 1

Hardware and Software 2

Chapter 6: Wireless LANs 3

Chapter 2 Defining VLANs 5

Lab 2-0a: Clearing an Isolated Switch (2.6.1) 5

Step 1 Getting Connected 5

Step 2 Deleting vlan.dat 5

Step 3 Erasing the startup-config File 6

Step 4 Reloading 6

Step 5 Ready for Configuration 9

Lab 2-0b: Clearing a Switch Connected to a Larger Network (2.6.1) 10

Step 1 Clearing an Isolated Switch 10

Step 2 Deleting vlan.dat 10

Step 3 Erasing the startup-config File 10

Step 4 Relearning VLANs from a Server 11

Step 5 Eliminating Relearned VLANs 12

Step 6 VTP Mode Transparent 13

Lab 2-1: Catalyst 2960 and 3560 Series Static VLANs, VLAN Trunking, and

VTP Domain and Modes (2.6.2) 14

Scenario: VLAN Trunking and Domains 14

Step 1 Preparing the Switch 14

Step 2 VLAN 1 15

Step 3 show vlan 15

Step 4 VTP Modes 17

Step 5 VTP Domains 18

Step 6 Dynamic Auto Trunking 19

Step 7 show interface Commands 21

Step 8 Switchport Mode Commands 23

Step 9 show vtp status 25

Step 10 VLAN Database 26

Step 11 Switchport Access VLAN 28

Step 12 Naming VLANs 29

Step 13 Preparation for the Next Lab 30

Chapter 3 Implementing Spanning Tree 31

Lab 3-1: Spanning Tree Protocol (STP) Default Behavior (3.5.1) 31

Scenario: How Spanning Tree Prevents Loops 31

Step 1 Basic Configurations 31

Step 2 BPDUs 32

Step 3 show spanning tree 32

Step 4 Diagraming Spanning Tree 36

Challenge: A New Root for Spanning Tree 36

Lab 3-2: Modifying Default Spanning Tree Behavior (3.5.2) 37

Scenario: Logically Removing Bridging Loops 37

Step 1 Deleting vlan.dat 37

Step 2 Verifying the Root Bridge 37

Step 3 Changing the Primary and Secondary Root 40

Step 4 Changing Forwarding and Blocking Ports 42

Step 5 PortFast 44

Step 6 Modifying Port Costs 46

Lab 3-3: Per-VLAN Spanning Tree Behavior (3.5.3) 49

Scenario: Configuring Spanning Tree Differently for Different VLANs 49

Step 1 Basic Preparation 49

Step 2 Setting up VTP Domains 49

Step 3 Modifying Spanning Tree on a per-VLAN Basis 52

Step 4 RSTP 58

Challenge: Spanning Tree Root Primary 60

Lab 3-4: Multiple Spanning Tree (3.5.4) 62

Scenario: Configuring Multiple Spanning Tree 62

Step 1 Basic Preparation 62

Step 2 VTP Domain Setup 62

Step 3 Verifying 11 Instances of Spanning Tree 63

Step 4 spanning-tree mode mst 66

Step 5 Grouping VLANs Using MST 67

Challenge: Modifying per-instance MST Attributes 70

Lab 3-5: Configuring EtherChannel (3.5.5) 72

Scenario: Bundling Redundant Links into One Logical Link 72

Step 1 Basic Preparation 72

Step 2 channel group mode desirable 72

Step 3 channel group mode active 75

Step 4 Configuring EtherChannel on Layer 3 Connections 75

Step 5 Traffic Load Balancing 76

Challenge: Logically Aggregating Additional Redundant Links 77

Chapter 4 Implementing Inter-VLAN Routing 79

Lab 4-1: Inter-VLAN Routing with an External Router (4.4.1) 79

Scenario: A Cost Effective Solution to Segment a Network into Multiple

Broadcast Domains 79

Step 1 Basic Preparation 79

Step 2 Configuring up the Gateway and ISP Router 79

Step 3 ip default-gateway 80

Step 4 Verify Existing VLANs 81

Step 5 Configuring Trunking and EtherChannel 82

Step 6 Configuring the VTP Domain 83

Step 7 Configuring Switch Access Ports for Hosts 83

Step 8 Trunking with the External Router 83

Step 9 Trunking for VLANs 1, 100, and 200 84

Step 10 Verify inter-VLAN Routing 86

Lab 4-2: Inter-VLAN Routing with an Internal Route Processor and Monitoring

CEF Functions (4.4.2) 87

Scenario: Configuring Switched Virtual Interfaces to Route Between

VLANs 87

Step 1 Basic Preparation 87

Step 2 Basic Configuration 87

Step 3 Configuring Trunks and EtherChannel 89

Step 4 Changing the VTP Mode 91

Step 5 Creating the VTP Domain 92

Step 6 Configuring the Host Ports 92

Step 7 Creating Layer 3 VLAN interfaces 93

Step 8 Verifying inter-VLAN Routing 94

Step 9 CEF 94

Chapter 5 Implementing High Availability in a Campus Environment 99

Lab 5-1: Hot Standby Router Protocol (5.4.1) 99

Scenario: Redundant, Fault-tolerant Routing to the Internal Network 99

Step 1 Basic Preparation 99

Step 2 Basic Configuration 99

Step 3 Configuring Trunks and EtherChannel 101

Step 4 Changing the VTP Mode 104

Step 5 Creating the VTP Domain 105

Step 6 Configuring the Host Ports 105

Step 7 HSRP Configuration 106

Step 8 show standby 108

Step 9 Verify Connectivity Between VLANs 112

Step 10 Verify HSRP 112

Lab 5-2: HSRP Troubleshooting (5.4.2) 113

Initial Configurations 113

Lab 5-3: Gateway Load Balancing Protocol 114

Step 1 Basic Preparation 114

Step 2 Basic Configuration 114

Step 3 GLBP Configuration and Verification 114

Step 4 Adjusting the Weight to Prefer Certain Routers 120

Chapter 6 Wireless LANs 125

Option 1: Using the External WLAN Controller 125

Option 2: Using the WLAN Controller Network Module 127

Lab 6-1a: Configuring an External WLAN Controller (6.7.1a) 129

Step 1 Basic Preparation 130

Step 2 Basic Configuration 130

Step 3 Configuring the Switched Virtual Interfaces 132

Step 4 DHCP 132

Step 5 PortFast 133

Step 6 Configuring the Host and Host Port 134

Step 7 Enable and Verify Routing 136

Step 8 WLAN Controller Wizard 136

Step 9 Additional WLAN Controller Configuration 138

Lab 6-1b: Configuring a WLAN Controller Installed in a Router (6.7.1b) 139

Step 1 Basic Preparation 139

Step 2 VLAN and VTP Domain Configuration 139

Step 3 Subinterfaces 140

Step 4 DHCP 141

Step 5 PortFast 142

Step 6 Configuring the Host and Host Port 142

Step 7 Verify Routing 144

Step 8 WLAN Controller Wizard 145

Step 9 Additional WLAN Controller Configuration 147

Lab 6-2: Configuring a WLAN Controller via the Web Interface (6.7.2) 149

Step 1 Load Existing Configurations from Previous Lab 150

Step 2 Using the Web Interface for Configuration 150

Step 3 Creating Logical Interfaces 152

Step 4 Configuring WLANs That Correspond to the VLANs 155

Lab 6-3: Configuring a Wireless Client (6.7.3) 158

Step 1 Install Cisco Aironet Wireless Card Software 159

Step 2 Inserting the Cisco 802.11 a/b/g Wireless Adapter 163

Step 3 Verify Status of Installation 166

Chapter 7 Configuring Campus Switches to Support Voice 169

Lab 7-1: Configuring Switches for IP Telephony Support (7.3.1) 169

Scenario: Preparing the Switching Network to Support Voice 169

Step 1 Basic Preparation 170

Step 2 Basic Configuration 170

Step 3 Configure the Trunks and EtherChannel 171

Step 4 Changing the VTP Mode 173

Step 5 Creating the VTP Domain 174

Step 6 HSRP 174

Step 7 Auto QoS Configuration 176

Step 8 Verify Auto QoS 177

Step 9 Configure the Distribution Layer to Trust CoS 177

Step 10 Verify Auto QoS at the Distribution Layer 178

Step 11 mls qos cos 179

Chapter 8 Minimizing Service Loss and Data Theft in a Campus Network 181

Lab 8-1: Securing the Layer 2 Switching Devices (8.7.1) 181

Scenario: Layer 2 Threats 181

Step 1 Basic Preparation 182

Step 2 Basic Configuration 182

Step 3 Configuring VLANs and VTP 184

Step 4 Layer 2 Attacks and Mitigation 186

Step 5 Protecting Against MAC Flooding 187

Step 6 DHCP Spoofing 188

Step 7 AAA 191

Lab 8-2: Securing Spanning Tree Protocol (8.7.2) 193

Scenario: Protecting the Root Bridge and Preventing Rogue Access Points 193

Step 1 Verify Configurations from Lab 8-1 193

Step 2 Locking Down the Spanning Tree Root 197

Step 3 spanning-tree guard root 199

Step 4 Verify Root Guard 199

Step 5 BPDU Guard 201

Step 6 UDLD 202

Lab 8-3: Securing VLANs with Private VLANs, RACLs, and VACLs

(8.7.3) 204

Scenario: Configuring the Network to Secure VLANs 204

Step 1 Verifying Loaded Configurations 204

Step 2 Private VLANs 207

Step 3 RACLs 210

Step 4 VACLs 211

Chapter 9 Case Studies 213

Case Study 1: VLANs, VTP, and Inter-VLAN Routing 213

Case Study 2: Voice and Security in a Switched Network 215

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020