Chapter 2. Basic Switching Concepts and Configuration

Objectives
Key Terms
Introduction (2.0.1.1)
Basic Switch Configuration (2.1)
Switch Boot Sequence (2.1.1.1)
Recovering from a System Crash (2.1.1.2)
Switch LED Indicators (2.1.1.3)
Preparing for Basic Switch Management (2.1.1.4)
Configuring Basic Switch Management Access with IPv4 (2.1.1.5)
Configure Switch Ports (2.1.2)
Duplex Communication (2.1.2.1)
Configure Switch Ports at the Physical Layer (2.1.2.2)
Duplex and Speed
Auto-MDIX (2.1.2.3)
Verifying Switch Port Configuration (2.1.2.4)
Network Access Layer Issues (2.1.2.5)
Troubleshooting Network Access Layer Issues (2.1.2.6)
Switch Security: Management and Implementation (2.2)
Secure Remote Access (2.2.1)
SSH Operation (2.2.1.1)
Configuring SSH (2.2.1.2)
Verifying SSH (2.2.1.3)
Security Concerns in LANs (2.2.2)
Common Security Attacks: MAC Address Flooding (2.2.2.1)
Common Security Attacks: DHCP Spoofing (2.2.2.2)
Common Security Attacks: Leveraging CDP (2.2.2.3)
Security Best Practices (2.2.3)
Best Practices (2.2.3.1)
Network Security Tools and Testing (2.2.3.2)
Network Security Audits (2.2.3.3)
Switch Port Security (2.2.4)
Secure Unused Ports (2.2.4.1)
DHCP Snooping (2.2.4.2)
Port Security: Operation (2.2.4.3)
Port Security: Violation Modes (2.2.4.4)
Port Security: Configuring (2.2.4.5)
Port Security: Verifying (2.2.4.6)
Ports in Error Disabled State (2.2.4.7)
Network Time Protocol (NTP) (2.2.4.8)
Summary (2.3)
Practice
Class Activities
Labs
Packet Tracer Activities
Check Your Understanding Questions