Module Overview
|
|
9.1 |
Monitoring
Switched Network Performance with SPAN and VSPAN
9.1.1 |
Monitoring
switched network performance with SPAN and VSPAN |
9.1.2 |
Monitoring
with SPAN on a port basis |
9.1.3 |
SPAN
interaction with other features |
9.1.4 |
SPAN and
VSPAN configuration limitations |
9.1.5 |
Configuring
SPAN sessions |
9.1.6 |
VSPAN – SPAN
using VLANS as monitored source |
|
|
9.2 |
RSPAN
9.2.1 |
RSPAN
overview |
9.2.2 |
RSPAN
reflector ports |
9.2.3 |
RSPAN
interaction with other features |
9.2.4 |
RSPAN and
RSPAN VLANs |
9.2.5 |
Configuring
RSPAN |
9.2.6 |
Configuring
RSPAN to filter trunks for specific VLAN traffic |
|
|
9.3 |
Network
Analysis Modules and Switch Fabric Modules
9.3.1 |
Overview of
network analysis and switch fabric modules |
9.3.2 |
The network
analysis module |
9.3.3 |
Using the NAM |
9.3.4 |
Benefits of
deploying a NAM |
9.3.5 |
NAM
troubleshooting |
9.3.6 |
Increasing
switching fabric in 6500 series switches |
9.3.7 |
Configuring
the Switch Fabric Module |
9.3.8 |
Monitoring
the Switch Fabric Module |
|
|
9.4 |
Basic Security
9.4.1 |
Access
control policy |
9.4.2 |
Basic
security measures |
9.4.3 |
Physical
security |
9.4.4 |
Connecting to
the switch |
9.4.5 |
Out-of-band
management |
9.4.6 |
In-band
management |
9.4.7 |
Basic
password protection |
|
|
9.5 |
Securing Remote
Management
9.5.1 |
Remote management security options |
9.5.2 |
Advanced user name options |
9.5.3 |
Encrypting communications using Secure
Shell |
9.5.4 |
Encryption key-pairs |
9.5.5 |
Using VLANs to restrict remote management |
9.5.6 |
Securing the web management interface |
9.5.7 |
Using access lists to restrict remote
management |
9.5.8 |
Additional remote management session
options |
9.5.9 |
Configuring verifying, and troubleshooting
SSH server |
|
|
9.6 |
Securing User
Access
9.6.1 |
Securing user access |
9.6.2 |
Using port security, protected ports, and
private VLANs |
9.6.3 |
Using access lists |
9.6.4 |
Router ACLs |
9.6.5 |
Port ACLs |
9.6.6 |
VLAN ACLs and VLAN maps |
9.6.7 |
Configuring and verifying port security |
9.6.8 |
Configuring and verifying protected ports |
9.6.9 |
Configuring and verifying access lists |
|
|
9.7 |
Authentication,
Authorization, and Accounting
9.7.1 |
Introduction to AAA and security protocols |
9.7.2 |
TACACS+ |
9.7.3 |
RADIUS |
9.7.4 |
Cisco Secure Access Control Server (ACS) |
9.7.5 |
Configuring AAA |
9.7.6 |
Configuring TACACS+ and RADIUS clients |
9.7.7 |
Configuring AAA authentication |
9.7.8 |
Configuring AAA authorization |
9.7.9 |
Configuring AAA accounting |
|
|
9.8 |
802.1X
Port-based Authentication
9.8.1 |
Understanding 802.1X |
9.8.2 |
Authentication initiation and message
exchange |
9.8.3 |
Ports in authorized and unauthorized
states |
9.8.4 |
Supported topologies |
9.8.5 |
802.1X configuration guidelines |
9.8.6 |
Configuring 802.1X port-base authentication |
|
|
9.9 |
Hands-on Lab
Exercises
9.9.1 |
SPAN configuration |
9.9.2 |
VSPAN configuration |
9.9.3 |
RSPAN configuration |
9.9.4 |
Setting encrypted passwords |
9.9.5 |
Using local usernames and passwords |
9.9.6 |
Advanced username options |
9.9.7 |
Management VLANs on a single switch |
9.9.8 |
Restricting virtual terminal sessions with
access lists |
9.9.9 |
Restricting web interface sessions with
access lists |
9.9.10 |
Configuring protected ports |
9.9.11 |
Configuring VLAN maps |
|
|
Module Summary
|
|
Module
Quiz
|
|