Comparison - CCNP v5 and v6
Switch Vs BCMSN
Switch 642-813
Implement VLAN based solution, given a network design and a set of
requirements
• Determine network resources needed for implementing a VLAN based solution on a network
• Create a VLAN based implementation plan
• Create a VLAN based verification plan
• Configure switch-to-switch connectivity for the VLAN based solution
• Configure loop prevention for the VLAN based solution
• Configure Access Ports for the VLAN based solution
• erify the VLAN based solution was implemented properly using show and debug commands
• Document results of VLAN implementation and verification
Implement a Security Extension of a Layer 2 solution, given a network
design and a set of requirements
• Determine network resources needed for implementing a Security solution
• Create a implementation plan for the Security solution
• Create a verification plan for the Security solution
• Configure port security features
• Configure general switch security features
• Configure private VLANs Configure VACL and PACL
• Verify the Security based solution was implemented properly using show and debug commands
• Document results of Security implementation and verification
Implement Switch based Layer 3 services, given a network design and a
set of requirements
• Determine network resources needed for implementing a Switch based Layer 3 solution
• Create an implementation plan for the Switch based Layer 3 solution
• Create a verification plan for the Switch based Layer 3 solution
• Configure routing interfaces Configure Layer 3 Security
• Verify the Switch based Layer 3 solution was implemented properly using show and debug commands
• Document results of Switch based Layer 3 implementation and verification
Prepare infrastructure to support advanced services
• Implement a Wireless Extension of a Layer 2 solution
• Implement a VoIP support solution
• Implement video support solution
Implement High Availability, given a network design and a set of
requirements
• Determine network resources needed for implementing High Availability on a network
• Create a High Availability implementation plan
• Create a High Availability verification plan
• Implement first hop redundancy protocols
• Implement switch supervisor redundancy
• Verify High Availability solution was implemented properly using show and debug commands
• Document results of High Availability implementation and verification
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
BCMSN 642-812
Implement VLANs
• Explain the functions of VLANs in a hierarchical network.
• Configure VLANs (e.g., Native, Default, Static and Access).
• Explain and configure VLAN trunking (i.e., IEEE 802.1Q and ISL).
• Explain and configure VTP.
• Verify or troubleshoot VLAN configurations.
Conduct the operation of Spanning Tree protocols in a hierarchical
network
• Explain the functions and operations of the Spanning Tree protocols (i.e., RSTP,
PVRST, MISTP).
• Configure RSTP (PVRST) and MISTP.
• Describe and configure STP security mechanisms (i.e., BPDU Guard, BPDU
Filtering, Root Guard).
• Configure and Verify UDLD and Loop Guard.
• Verify or troubleshoot Spanning Tree protocol operations.
• Configure and verify link aggregation using PAgP or LACP.
Implement Inter-VLAN routing
• Explain and configure Inter-VLAN routing (i.e., SVI and routed ports).
• Explain and enable CEF operation.
• Verify or troubleshoot InterVLAN routing configurations.
Implement gateway redundancy technologies
• Explain the functions and operations of gateway redundancy protocols (i.e., HSRP,
VRRP, and GLBP).
• Configure HSRP, VRRP, and GLBP.
• Verify High Availability configurations.
Describe and configure wireless client access
• Describe the components and operations of WLAN topologies (i.e., AP and Bridge).
• Describe the features of Client Devices, Network Unification, and Mobility Platforms
(i.e., CCX, LWAPP).
• Configure a wireless client (i.e., ADU).
Describe and configure security features in a switched network
• Describe common Layer 2 network attacks (e.g., MAC Flooding, Rogue Devices,
VLAN Hopping, DHCP Spoofing, etc.)
• Explain and configure Port Security,802.1x, VACLs, Private VLANs, DHCP Snooping, and DAI.
• Verify Catalyst switch (IOS-based) security configurations (i.e., Port Security,
802.1x, VACLs, Private VLANs, DHCP Snooping, and DAI).
Configure support for voice
• Describe the characteristics of voice in the campus network.
• Describe the functions of Voice VLANs and trust boundaries.
• Configure and verify basic IP Phone support (i.e. Voice VLAN, Trust and CoS
options, AutoQoS for voice).
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Post a Comment