Project Description

Layer 2 Technologies

1.1        LAN switching technologies

1.1.a Implement and troubleshoot switch administration

  • 1.1.a (i)       Managing MAC address table
  • 1.1.a (ii)  errdisable recovery
  • 1.1.a (iii) L2 MTU

1.1.b  Implement and troubleshoot layer 2 protocols

  • 1.1.b (i)    CDP, LLDP
  • 1.1.b (ii) UDLD

1.1.c  Implement and troubleshoot VLAN

  • 1.1.c (i)     access ports
  • 1.1.c (ii) VLAN database
  • 1.1.c (iii) normal, extended VLAN, voice VLAN

1.1.d  Implement and troubleshoot trunking

  • 1.1.d (i)   VTPv1, VTPv2, VTPv3, VTP pruning
  • 1.1.d (ii) dot1Q
  • 1.1.d (iii) Native VLAN
  • 1.1.d (iv) Manual pruning

1.1.e  Implement and troubleshoot etherchannel

  • 1.1.e (i)     LACP, PAgP, manual
  • 1.1.e (ii) layer 2, layer 3
  • 1.1.e (iii) load-balancing
  • 1.1.e (iv) etherchannel misconfiguration guard

1.1.f  Implement and troubleshoot spanning-tree

  • 1.1.f (i)     PVST+/RPVST+/MST
  • 1.1.f (ii)             switch priority, port priority, path cost, STP timers
  • 1.1.f (iii) port fast, BPDUguard, BPDUfilter
  • 1.1.f (iv) loopguard, rootguard

1.1.g      Implement and troubleshoot other LAN switching technologies

  • 1.1.g (i)    SPAN, RSPAN, ERSPAN

shutterstock_234708769-cropped

1.2 Layer 2 Multicast

1.2.a     Implement and troubleshoot IGMP

  • 1.2.a (I)   IGMPv1, IGMPv2, IGMPv3
  • 1.2.a (ii) IGMP snooping
  • 1.2.a (iii) IGMP querier
  • 1.2.a (iv) IGMP filter
  • 1.2.a (v) IGMP proxy

1.3 Layer 2 WAN circuit technologies

1.3.a     Implement and troubleshoot HDLC

1.3.b     Implement and troubleshoot PPP

  • 1.3.b (i)          authentication (PAP, CHAP)
  • 1.3.b (ii) PPPoE
  • 1.3.b (iii) MLPPP

1.4 Troubleshooting layer 2 technologies

1.4.a     Use IOS troubleshooting tools

  • 1.4.a (i)    debug, conditional debug
  • 1.4.a (ii) ping, traceroute with extended options
  • 1.4.a (iii) Embedded packet capture

1.4.b    Apply troubleshooting methodologies

  • 1.4.b (i)    Diagnose the root cause of networking issue (analyze symptoms, identify and describe root cause)
  • 1.4.b (ii) Design and implement valid solutions according to constraints
  • 1.4.b (iii) Verify and monitor resolution

1.4.c      Interpret packet capture

  • 1.4.c (i)           Using wireshark trace analyzer
  • 1.4.c (ii) Using IOS embedded packet capture