1. Part II : Building a Campus Network
    1. Chapter 2: Switch Operation
      1. Layer 2 Switch Operation
        1. Transparent Bridging
        2. Follow That Frame!
      2. Multilayer Switch Operation
        1. Types of Multilayer Switching
        2. Follow That Packet!
        3. Multilayer Switching Exceptions
      3. Tables Used in Switching
        1. Content-Addressable Memory
        2. Ternary Content-Addressable Memory
      4. Monitoring Switching Tables
        1. CAM Table Operation
        2. TCAM Operation
      5. Define Key Terms
    2. Chapter 3: Switch Port Configuration
      1. Ethernet Concepts
        1. Ethernet (10 Mbps)
        2. Fast Ethernet
        3. Gigabit Ethernet
        4. 10-Gigabit Ethernet
      2. Connecting Switches and Devices
        1. Ethernet Port Cables and Connectors
        2. Gigabit Ethernet Port Cables and Connectors
      3. Switch Port Configuration
        1. Selecting Ports to Configure
        2. Identifying Ports
        3. Port Speed
        4. Port Duplex Mode
        5. Managing Error Conditions on a Switch Port
        6. Enable and Use the Switch Port
        7. Troubleshooting Port Connectivity
      4. Define Key Terms
    3. Chapter 4: VLANs and Trunks
      1. Virtual LANs
        1. VLAN Membership
        2. Deploying VLANs
      2. VLAN Trunks
        1. VLAN Frame Identification
        2. Dynamic Trunking Protocol
      3. VLAN Trunk Configuration
        1. VLAN Trunk Configuration
      4. Troubleshooting VLANs and Trunks
      5. Define Key Terms
    4. Chapter 5: VLAN Trunking Protocol
      1. VLAN Trunking Protocol
        1. VTP Domains
        2. VTP Modes
        3. VTP Advertisements
      2. VTP Configuration
        1. Configuring a VTP Management Domain
        2. Configuring the VTP Mode
        3. Configuring the VTP Version
        4. VTP Configuration Example
        5. VTP Status
      3. VTP Pruning
        1. Enabling VTP Pruning
      4. Troubleshooting VTP
      5. Define Key Terms
    5. Chapter 6: Aggregating Switch Links
      1. Switch Port Aggregation with EtherChannel
        1. Bundling Ports with EtherChannel
        2. Distributing Traffic in EtherChannel
        3. Configuring EtherChannel Load Balancing
      2. EtherChannel Negotiation Protocols
        1. Port Aggregation Protocol
        2. Link Aggregation Control Protocol
      3. EtherChannel Configuration
        1. Configuring a PAgP EtherChannel
        2. Configuring a LACP EtherChannel
      4. Troubleshooting an EtherChannel
      5. Define Key Terms
    6. Chapter 7: Traditional Spanning Tree Protocol
      1. IEEE 802.1D Overview
        1. Bridging Loops
        2. Preventing Loops with Spanning Tree Protocol
        3. Spanning-Tree Communication: Bridge Protocol Data Units
        4. Electing a Root Bridge
        5. Electing Root Ports
        6. Electing Designated Ports
        7. STP States
        8. STP Timers
        9. Topology Changes
      2. Types of STP
        1. Common Spanning Tree
        2. Per-VLAN Spanning Tree
        3. Per-VLAN Spanning Tree Plus
      3. Define Key Terms
    7. Chapter 8: Spanning-Tree Configuration
      1. STP Root Bridge
        1. Root Bridge Placement
        2. Root Bridge Configuration
      2. Spanning-Tree Customization
        1. Tuning the Root Path Cost
        2. Tuning the Port ID
      3. Tuning Spanning-Tree Convergence
        1. Modifying STP Timers
      4. Redundant Link Convergence
        1. PortFast: Access-Layer Nodes
        2. UplinkFast: Access-Layer Uplinks
        3. BackboneFast: Redundant Backbone Paths
      5. Monitoring STP
      6. Define Key Terms
    8. Chapter 9: Protecting the Spanning Tree Protocol Topology
      1. Protecting Against Unexpected BPDUs
        1. Root Guard
        2. BPDU Guard
      2. Protecting Against Sudden Loss of BPDUs
        1. Loop Guard
        2. UDLD
      3. Using BPDU Filtering to Disable STP on a Port
      4. Troubleshooting STP Protection
      5. Define Key Terms
    9. Chapter 10: Advanced Spanning Tree Protocol
      1. Rapid Spanning Tree Protocol
        1. RSTP Port Behavior
        2. BPDUs in RSTP
        3. RSTP Convergence
        4. Topology Changes and RSTP
        5. RSTP Configuration
        6. Rapid Per-VLAN Spanning Tree Protocol
      2. Multiple Spanning Tree Protocol
        1. MST Overview
        2. MST Regions
        3. Spanning-Tree Instances Within MST
        4. MST Configuration
        5. Define Key Terms
    10. Chapter 11: Multilayer Switching
      1. InterVLAN Routing
        1. Types of Interfaces
        2. Configuring InterVLAN Routing
      2. Multilayer Switching with CEF
        1. Traditional MLS Overview
        2. CEF Overview
        3. Forwarding Information Base
        4. Adjacency Table
        5. Packet Rewrite
        6. Configuring CEF
      3. Verifying Multilayer Switching
        1. Verifying InterVLAN Routing
        2. Verifying CEF
      4. Using DHCP with a Multilayer Switch
        1. Configuring an IOS DHCP Server
        2. Configuring a DHCP Relay
      5. Define Key Terms
  2. Part III: Designing Campus Networks
    1. Chapter 12: Enterprise Campus Network Design
      1. Hierarchical Network Design
        1. Predictable Network Model
        2. Access Layer
        3. Distribution Layer
        4. Core Layer
      2. Modular Network Design
        1. Switch Block
        2. Core Block
      3. Define Key Terms
    2. Chapter 13: Layer 3 High Availability
      1. Router Redundancy in Multilayer Switching
        1. Packet-Forwarding Review
        2. Hot Standby Router Protocol
        3. Virtual Router Redundancy Protocol
        4. Gateway Load Balancing Protocol
        5. Verifying Gateway Redundancy
      2. Supervisor and Route Processor Redundancy
        1. Redundant Switch Supervisors
        2. Configuring the Redundancy Mode
        3. Configuring Supervisor Synchronization
        4. Nonstop Forwarding
      3. Define Key Terms
  3. Part IV: Campus Network Services
    1. Chapter 14: IP Telephony
      1. Power over Ethernet
        1. How PoE Works
          1. Cisco Inline Power (ILP)
          2. Cisco proprietary method developed before the IEEE 802.3af
          3. IEEE 802.3af
          4. A standards-based method that offers vendor interoperability
        2. Detecting a Powered Device
          1. IEEE 802.3af Power Classes.png
        3. Supplying Power to a Device
        4. Configuring PoE
        5. Verifying PoE
      2. Voice VLANs
        1. Voice VLAN Configuration
        2. Verifying Voice VLAN Operation
      3. Voice QoS
        1. QoS Overview
        2. Best-Effort Delivery
        3. Integrated Services Model
        4. Differentiated Services Model
        5. DiffServ QoS
        6. Implementing QoS for Voice
        7. Configuring a Trust Boundary
        8. Using Auto-QoS to Simplify a Configuration
        9. Verifying Voice QoS
      4. Define Key Terms
    2. Chapter 15: Integrating Wireless LANs
      1. Wireless LAN Basics
        1. Comparing Wireless and Wired LANs
        2. Avoiding Collisions in a WLAN
      2. WLAN Building Blocks
        1. Access Point Operation
        2. Wireless LAN Cells
      3. WLAN Architecture
        1. Traditional WLAN Architecture
        2. Cisco Unified Wireless Network Architecture
        3. WLC Functions
        4. Lightweight AP Operation
        5. Traffic Patterns in a Cisco Unified Wireless Network
      4. Roaming in a Cisco Unified Wireless Network
        1. Intracontroller Roaming
        2. Intercontroller Roaming
        3. Mobility Groups
      5. Configuring Switch Ports for WLAN Use
        1. Configuring Support for Autonomous APs
        2. Configuring Support for LAPs
        3. Configuring Support for WLCs
      6. Define Key Terms
  4. Part V: Securing Switched Networks
    1. Chapter 16: Securing Switch Access
      1. Port Security
      2. Port-Based Authentication
        1. 802.1x Configuration
        2. 802.1x Port-Based Authentication Example
      3. Mitigating Spoofing Attacks
        1. DHCP Snooping
        2. IP Source Guard
        3. Dynamic ARP Inspection
      4. Best Practices for Securing Switches
      5. Define Key Terms
    2. Chapter 17: Securing with VLANs
      1. VLAN Access Lists
        1. VACL Configuration
      2. Private VLANs
        1. Private VLAN Configuration
        2. Configure the Private VLANs
        3. Associate Ports with Private VLANs
        4. Associate Secondary VLANs to a Primary VLAN SVI
      3. Securing VLAN Trunks
        1. Switch Spoofing
        2. VLAN Hopping
      4. Define Key Terms