(c)We Want to Hear from You



Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide

First Edition

Copyright © 2015 Cisco Systems, Inc.

ISBN-10: 1-58720-664-1

ISBN-13: 978-1-58720-664-1

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it.

When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing.

First Printing: May 2015

Corrections for April 5, 2017

|Pg |Error – Third Printing |Correction |

|109 |Chapter 3, Last Bullet |Should read: |

| |Reads: | |

| |■ For EtherChannel, it is highly recommended to use the even number of ports in |■ It is best practice to use a power of two (i.e. 2,4,8, 16) number of ports in the channel to |

| |the channel to have better load balancing. |achieve optimal load-balancing. |

Corrections for March 11, 2017

|Pg |Error – Third Printing |Correction |

|124 |Chapter 4, Bridge Protocol Data Units, First Bullet |Should read: |

| |Reads: | |

| |Configuration BDPUs: Used for calculating the STP |Configuration BPDUs: Used for calculating the STP |

Corrections for October 22, 2016

|Pg |Error – Third Printing |Correction |

|349 |Chapter 7, Renumber Question 21 |Should read: |

| |Reads: | |

| |21 |19 |

|471 |Appendix A, Chapter 7, Renumber Question 21 |Should read: |

| |Reads: | |

| |21 |19 |

Corrections for February 3, 2016

|Pg |Error – Second Printing |Correction |

|14 |Chapter 2, Third Paragraph, First Sentence |Should read: |

| |Reads: | |

| |In addition, the distribution layer optionally provides default gateway |In addition, the distribution layer optionally provides default gateway redundancy by using a |

| |redundancy by using a first-hop routing protocol (FHRP) such as Host Standby |first-hop routing protocol (FHRP) such as Hot Standby Routing Protocol (HSRP),….. |

| |Routing Protocol (HSRP),….. | |

|32 |Chapter 2, Figure 2-18, Second Box at Bottom |Should read: |

| |Reads: | |

| |Distribute FIB |Distributed FIB |

|97 |Errata Correction: Chapter 3, LACP, First Paragraph, First Sentence |Should read: |

| |Reads: | |

| |Link Aggregation Control Protocol (LACP) is now part of 802.1AX and 802.1aq |Link Aggregation Control Protocol (LACP) is part of an IEEE specification (802.1AX and 802.1aq) that|

| |(latest version 2015) that allows several physicals ports….. |allows several physicals ports….. |

|115 |Chapter 3, Add Sentence to Question 23 |Sentence to add: |

| | |Newer versions of IOS have changed the configuration commands for VTP and this question no longer |

| | |properly quizzes VTP. |

|454 |Chapter 10, Insert Note Right Before PVLAN configuration |Note to Add: |

| | |NOTE VTP3 version 3 supports PVLAN. |

|264 |Chapter 6, Figure 6-15, Remove Last Config Line |Line to remove: |

| | |Switch2 (config-if)# standby 20 preempt |

|264 |Errata Correction: Chapter 6, Example 6-1, Remove Seventh config line |Line to remove: |

| | |Switch1 (config-if)# standby 10 preempt |

|265 |Chapter 6, Figure 6-16, Remove Seventh Config Line |Line to remove: |

| | |Switch2 (config-if)# standby 10 preempt |

|265 |Errata Correction: Chapter 6, Example 6-2, Remove Last Config Line |Line to remove: |

| | |Switch2 (config-if)# standby 20 preempt |

|271 |Chapter 6, Configuring HSRP Authentication, Fourth Paragraph |Should read: |

| |Reads: | |

| |To configure MD5 authentication, use the following interface configuration |To confgure MD5 authentication, use the following interface configuration command on the HSRP peers |

| |command on HSRP peers: |as shown below for HSRP group:  |

| |Switch(config-if)# standby group authentication md5 key-string [0 | 7] sting | |

| | |Switch(config-if)# standby group-number authentication md5 key-string [ 0 | 7 ] string |

|284 |ERRATA Correction: Chapter 6, First Paragraph, Sixth Sentence |Should read: |

| |Reads: | |

| |The GLBP timers can be adjusted with the glbp group timers [msec] hellotime |The GLBP timers can be adjusted with the glbp group timers [msec] hellotime [msec] holdtime command. |

| |[msec] holdtime [msec] holdtime command. | |

Corrections for January 18, 2016

|Pg |Error – Second Printing |Correction |

|4 |Chapter 1, Figure 1-1, (two places) |Should read: |

| |Abbreviation for Start-of-frame delimiter ‘SFD’ |SOF |

|55 |Chapter 3, Table 3-3, VLAN Range for 1006-1024 Range Usage |Should read: |

| |Reads: | |

| |Reserved for system use only. You cannot see or use these VLANS. |Reserved for system use only. You cannot see or use these VLANs. |

|55 |Chapter 3, Table 3-3, VLAN Range, 1025-4094, Propagated via VTP, Second Sentence |Should read: |

| |Reads: | |

| |The switch must be in VTP transparent mode to configure extended-range VLANS. | |

| | |The switch must be in VTP transparent mode to configure extended-range VLANs. |

|74 |Chapter 3, First Bullet |Should read: |

| |Reads: | |

| |Extended VLAN support: VTP also can be used to propagate VLANs with numbers |Extended VLAN support: VTP also can be used to propagate VLANs with numbers 1017-4094 (1006-1017 and |

| |1017-4094 (1006-1017 and 4095-2096 are reserved). |4095-4096 are reserved). |

|77 |Chapter 3, Advertisement Requests |Remove indentation |

|87 |Chapter 3, Figure 3-20, Lower Left Side, Under Eth0/3 |Should read: |

| |Reads: | |

| |PC3A PC3B |PC3A PC3B |

| |(VLAN10) (VLAN20) |(VLAN20) (VLAN30) |

|97 |Chapter 3, LACP, First Paragraph, First Sentence |Should read: |

| |Reads: | |

| |Link Aggregation Control Protocol (LACP) is part of an IEEE specification |Link Aggregation Control Protocol (LACP) is now part of 802.1AX and 802.1aq (latest version 2015) |

| |(802.3ad) that allows several physicals ports….. |that allows several physicals ports….. |

|104 |Chapter 3, First Paragraph, Second sentence |Should read: |

| |Reads: | |

| |You can investigate the running configuration and see that EtherChannel 1/1 and | |

| |EtherChannel ½ both have had the trunking configuration applied. |You can investigate the running configuration and see that Ethernet 1/1 and Ethernet1/2 both have had|

| | |the trunking configuration applied. |

|108 |Chapter 3, First Paragraph, Third Sentence |Should read: |

| |Reads: | |

| |In both cases, the hash function will be the same, and traffic will go over the |In both cases, the hash function will be the same, and traffic will go over the same link (in this |

| |same link (in this example, Ethernet ½). |example, Ethernet1/2). |

|111 |Chapter 3, Question 8 |Should Read: |

| |Reads: | |

| |8. Which statement is true for the configuration of the interface in Example |8. Which statements are true for the configuration of the interface in Example 3-14? |

| |3-14? | |

|111 |Chapter 3, Question 8, Answer a |Should read: |

| |Reads: | |

| |a. The interface is a member of VLAN 5 and may negotiate to a trunk port. |a. The interface is a member of VLAN 5 if the interface does negotiate to a trunk. |

|127 |Chapter 4, Table 4-3, First Line |Should read: |

| |Reads: | |

| |Link Cost |Link Cost |

| |10 Gbps 1 |10 Gbps 2 |

|127 |Chapter 4, Fifth Paragraph, Sixth Sentence |Should read: |

| |Reads: | |

| |For example, in Figure 4-6, the port Ethernet 0/1 on Switch 2 will have the port |For example, in Figure 4-6, the port Ethernet0/1 on SW2 will have the port ID 128.2, the port |

| |ID 128.1, the port Ethernet 0/3 will have port ID 128.3, and so on. |Ethernet 0/3 will have port ID 128.3. |

|128 |Chapter 4, First and Second Bullets |Should read: |

| |Read: | |

| |Lowest root BID |Lowest root path cost to root bridge |

| |Lowest root path cost to root bridge |Lowest root BID |

|129 |Chapter 4, Table 4-4, Duration of State for Forwarding |Should read: |

| |Reads: | |

| |Undefined (as long as there is a loop) |Undefined (as long as there is no loop) |

|134 |Chapter 4, Figure 4-11, Two Left Arrows Point Down |Two Left Arrows Should be pointing Up |

| |Arrow from SW1 to SW2 and Arrow from SW2 to SW4 | |

| | |Arrow from SW1 to SW2 should be pointing Up, Arrow from SW2 to SW4 should be pointing Up |

|139 |Chapter 4, Example 4-1, Last Interface, Last Prio.Nbr |Should read: |

| |Reads: | |

| |128.2 |128.3 |

|146 |Chapter 4, Second Paragraph, First and Second Sentences |Should read: |

| |Reads: | |

| |As shown in Figure 4-16, Ethernet 0/1 and Ethernet 0/2 have the same interface |As shown in Figure 4-16, Ethernet 0/1 and Ethernet 0/2 of SW3 have the same interface STP cost to the|

| |STP cost. Ethernet 0/1 is forwarding because its sender’s port ID (128.2) is |root SW2. Ethernet 0/1 of SW3 is forwarding because its sender’s port ID of Ethernet 0/1 of SW2 |

| |lower than that of Ethernet 0/2 (128.4). |(128.2) is lower than that of Ethernet 0/3 (128.4) of SW2. |

|146 |Chapter 4, Third Paragraph, First, Second and Third Sentences |Should read: |

| |Read: | |

| |Right now, Ethernet 0/1 is the root port on SW because of the lower port |Right now, Ethernet 0/1 is the root port on SW3 because of the lower port priority on SW2. Ethernet |

| |priority. Ethernet 0/2 has a port priority of 128.3, and Ethernet 0/1 has a port |0/2 of SW3 has a root priority of 128.3 and Ethernet 0/1 of SW3 has the root priority of 128.2. |

| |priority of 128.2. Because only the cost is changed, the port priority will not |Because only the cost is changing, the port priority will not be observed. |

| |be observed. | |

|160 |Chapter 4, Example 4-15, Fifth Command |Should read: |

| |Reads: | |

| |Switch# show spanning-tree totals |Switch# show spanning-tree summary totals |

|193 |Chapter 4, Example 4-33, Role and Sts for Et0/2 and Et0/3 |Should read: |

| |Reads: | |

| |Role Sts |Role Sts |

| |---- ---- |---- ---- |

| |Et0/2 Altn BLK |Et0/2 Root FWD |

| |Et0/3 Root FWD |Et0/3 Altn BLK |

|193 |Chapter 4, Example 4-34, Role and Sts for Et0/2 and Et0/3 |Should read: |

| |Reads: | |

| |Role Sts |Role Sts |

| |---- ---- |---- ---- |

| |Et0/2 Altn BLK |Et0/2 Root FWD |

| |Et0/3 Root FWD |Et0/3 Altn BLK |

|210 |Chapter 5, Step 7, Remove Last Line |Line to Remove: |

| | |External Router: Advantages and Disadvantages |

|214 |Chapter 5, SVI: Advantages and Disadvantages, Fifth Bullet |Should read: |

| |Reads: | |

| |It needs a Layer 3 switch to perform inter-VLAN routing, which is more expensive |It needs a Layer 3 switch to perform inter-VLAN routing, which is more expensive (for example, |

| |(for example, Catalyst 3500 series). |Catalyst 3560 series). |

|215 |Chapter 5, Routed Ports: Advantages, Bullet Points |Should read: |

| |Reads: | |

| |A multilayer switch can have SV1 and routed ports in a single switch. How is this|Routed Ports are used more for one to point links to connect the datacenter or distribution blocks to|

| |an advantage of a routed port? |the core blocks so both SV1 and Routed ports can be present in the Layer 3 Switch. |

| |Multilayer switches forward either Layer 2 or Layer 3 traffic in hardware, so it |Just like layer 3 SV1, routed ports are also hardware switched so it helps to do routing in hardware.|

| |helps to do routing faster. | |

|240 |Chapter 5, Example 5-4, Second Config |Should read: |

| |Reads: | |

| |Switch (dhcp-config)# options 150.10.10.1 |Switch (dhcp-config)# option 150.10.10.10.1 |

|246 |Chapter 5, Remove Question 21 and Answers as this is a duplicate |Remove question and answers # 21 and renumber 22 to 21 |

|258 |Chapter 6, Figure 6-9, PC1 |Should read: |

| |Reads: | |

| |What is the MAC address to reach 192.168.2.44? |What is the MAC address to reach 192.168.4.22? |

|264 |Chapter 6, Example 6-1, Seventh config |Should read: |

| |Reads: | |

| |Switch1 (config-if)# standby preempt |Switch1 (config-if)# standby 10 preempt |

|265 |Chapter 6, Example 6-2, Last Config Line |Should read: |

| |Reads: | |

| |Switch2 (configif)# standby 20 preempt |Switch2 (config-if)# standby 20 preempt |

|271 |Chapter 6, Configuring HSRP Authentication, First Sentence and Command after the |Should read: |

| |Second Bullet | |

| |Reads: |To configure plan-text authentication, use the following interface configuration command on HSRP |

| |To configure plan-text authentication, use the following interface configuration |peers for group 1: |

| |command on HSRP peers: |Switch(config-if)# standby group authentication string |

| |Switch(config-if)# standby group authentication string | |

|271 |Chapter 6, Configuring HSRP Authentication, After the Fifth Paragraph, Command |Should read: |

| |Reads: | |

| |Switch(config-if)# standby group authentication md5 key-string [0 | 7] string |Switch(config-if)# standby 1 authentication md5 key-string [0 | 7] string |

|272 |Chapter 6, Second Paragraph, Last Command |Should read: |

| |Reads: | |

| |Switch(config-if)# standby group authentication md5 key-chain chain-name |Switch(config-if)# standby 1 authentication md5 key-chain chain-name |

|272 |Chapter 6, Tuning HSRP Timers, Third Paragraph Command |Should read: |

| |Reads: | |

| |Switch(config-if)# standby group-number timers [msec] hellotime [msec] holdtime |Switch(config-if)# standby [group-number] timers [msec] hellotime [msec] holdtime |

| |standby [group-number] timers [msec] hellotime [msec] holdtime | |

|300 |Chapter 6, Example 6-4, Sixth Command |Should read: |

| |Reads: | |

| |S1 (config-if) # glbp 1 priority 110 |S1 (config-if)# glbp 1 priority 110 |

|301 |Chapter 6, Summary, Third Paragraph, Last Sentence |Should read: |

| |Reads: | |

| |You can have up to five active forwarders per GLBP group. | |

| | |You can have up to four active forwarders per GLBP group. |

|469 |Appendix A, Chapter 3, Answer 8 |Should read: |

| |Reads: | |

| |8. A |8. A and C |

|470 |Appendix A, Chapter 5, Answer 7 |Should read: |

| |Reads: | |

| |7. B and E |7. B and F |

|471 |Appendix A, Chapter 5, Answer 21 |Remove Answer 21 and renumber 22 to 21 |

Corrections for November 13, 2015

|Pg |Error – First Printing |Correction |

|283 |Chapter 6, Title |Should read: |

| |Reads: | |

| |Comparing GLPB to HSRP |Comparing GLBP to HSRP |

|284 |Chapter 6, First Paragraph, Sixth Sentence |Should read: |

| |Reads: | |

| |The GLBP timers can be adjusted with the glbp group timers [msec] hellotime |The GLBP timers can be adjusted with the glbp group timers [msec] hellotime [msec] holdtime [msec] |

| |[msec] holdtime glbp group timers [msec] hellotime [msec] holdtime [msec] |holdtime command. |

| |holdtime command. | |

Corrections for August 7, 2015

|Pg |Error – First Printing |Correction |

|47 |Chapter 3, Last Paragraph in Section Comparison of End-to-End VLANs and Local |Should read: |

| |VLANs | |

| |Reads: |Based on the data presented in this section, there are many reasons to implement end-to-end VLANs. |

| |Based on the data presented in this section, there are many reasons to implement |However, the problem with end-to-end VLANs is that they become difficult to maintain as it increases |

| |end-to-end VLANs. The main reason to implement local VLANs is simplicity. Local |the spanning-tree domain as well as broadcast domains. Special considerations should be done when |

| |VLAN configures are quick and easy for small-scale networks. |deploying end-end VLANs. |

|79 |Chapter 3, Step 1 |Should read: |

| |Reads: | |

| |Step 1. Configure VTP on all the switches, Switch 1 and Switch 3 as client mode, |Step 1. Configure VTP on all the switches, Switch 1 as client mode,  Switch 3 as transparent |

| |where Switch2 as server mode |mode where as Switch2 as server mode |

|79 |Chapter 3, Step 1, Lines 6 thru 9 |Should read: |

| |Reads: | |

| |Switch3(config) # vtp password Cisco  |Switch3(config) # vtp password Cisco  |

| |Switch3(config)#vtp mode client |Switch3(config)#vtp mode transparent  |

| |Switch3(config)#vtp domain CCNP  |Switch3(config)#vtp domain CCNP  |

| |Switch3(config)#vtp version 1  |Switch3(config)#vtp version 1  |

Corrections for July 7, 2015

|Pg |Error |Correction |

|49 |Chapter 3, Implementing a Trunk in a Campus Environment, First Paragraph, Third |Should read: |

| |Sentence | |

| |Reads: | |

| |PC 1 in VLAN 1 can communicate with the host in VLAN 21 on another switch over |PC 1 in VLAN 1 can communicate with the host in VLAN 1 on another switch over the single trunk link, |

| |the single trunk link, the same as host in VLAN 20 can communicate with a host in|the same as host in VLAN 20 can communicate with a host in another switch in VLAN 20. |

| |another switch in VLAN 20. | |

|469 |Appendix A, Chapter 2 Answers |Should read: |

| |Reads: | |

| |B |A |

| |B |E |

| |B |F |

| |A, B, C d |A, B, C |

| |B |A |

| |B |D |

| |C |C – 1; B – 3; A – 2 |

| |A, B, C, E, F, G |A |

| |False |A |

| |A and C |C |

| |B and C |B, C |

| |E |C |

| |C |B |

| |C |B |

| |A, B, D, E, F |A, C |

| |A |A |

| |F |A, C, E |

| |A, B, E |A |

| |E |D |

| |A |A, B |

| |B and C |B |

| |C |A |

| |D | |

Corrections for June 12, 2015

|Pg |Error |Correction |

|124 |Chapter 4, Figure 4-3, BPDU, Ninth Column |Should read: |

| |Reads: | |

| |Massage Age |Message Age |

This errata sheet is intended to provide updated technical information. Spelling and grammar misprints are updated during the reprint process, but are not listed on this errata sheet.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download