IT and Desktop Videos

Download a course collection

Networks And Telecommunications

Expand all | Collapse all

Cisco (4179)
Title Speaker Summary ID
Tshoot 2.0: Validating Two Hosts Are In The Same Subnet Raymond Lacoste

When preparing for the TSHOOT 2.0 examination; you should know how to examine a client’s address and determine if it is addressed properly to be used on a subnet. In this video; Raymond Lacoste demonstrates how to validate whether devices are within the same subnet.

70334
Tshoot 2.0: Verification Commands For Ipv4 And Ipv6 Addressing Raymond Lacoste

The TSHOOT 2.0 certification covers the verification commands for IPv4 and IPv6 addressing. There are a number of such commands which can be used on a Windows PC and on routers. In this video; Raymond Lacoste demonstrates some of the key troubleshooting verification commands; including ipconfig; ping; tracert; show ip interface; and show ip interface brief.

70348
Tshoot 2.0: Verifying Client Addressing Raymond Lacoste

When preparing for the TSHOOT 2.0 examination; you should know how to troubleshoot problems by examining a client’s IP address and determining if they are addressed properly. Two commands are useful when doing this – ipconfig and ipconfig /all. In this video; Raymond Lacoste discusses how to verify IP addresses.

70332
Tshoot 2.0: Verifying Router Addressing Raymond Lacoste

The TSHOOT 2.0 examination assesses your knowledge of the types of devices that require IP addresses in order to communicate across a network as well as how to verify IP addresses on router interfaces. In this video; Raymond Lacoste demonstrates how to verify router addressing.

70333
Tshoot 2.0: Vrrp Operation Issues Raymond Lacoste

The TSHOOT 2.0 certification covers how you can troubleshoot issues with mismatched timers; group numbers; and virtual IP addresses; and authentication failure. These are common causes of a Virtual Router Redundancy Protocol (VRRP) router not forwarding traffic; or multiple masters existing in a group. In this video; Raymond Lacoste demonstrates how to identify and resolve these issues.

70408
Tshoot 2.0: Vacl Issues Ii Raymond Lacoste

When preparing for the TSHOOT 2.0 certification you need to be able to troubleshoot VLAN access control list (ACLs) when traffic is not being filtered properly. In this video; Raymond Lacoste demonstrates how to troubleshoot the ACL; the VLAN access map itself; and the VLAN filter that is applying the access map to particular VLAN.

70432
Tshoot 2.0: Troubleshooting Redistribution Into Eigrp For Ipv6 Raymond Lacoste

TSHOOT 2.0 certification covers the troubleshooting of route redistribution into EIGRP for IPv6 networks. In this video; Raymond Lacoste demonstrates EIGRP for IPv4/IPv6 similarities; sets EIGRP for IPv6’s seed metric; and uses the include-connected keyword to redistribute directly connected interfaces.

70450
Tshoot 2.0: Troubleshooting Redistribution Into Ospfv2 Raymond Lacoste

The TSHOOT 2.0 certification covers the troubleshooting of route redistribution into OSPFv2 networks where EIGRP and OPSV routes exist in the autonomous system boundary router route table. In this video; Raymond Lacoste demonstrates common issues preventing the redistribution of routes into OSPFv2.

70439
Tshoot 2.0: Troubleshooting Redistribution Into Ospfv3 Raymond Lacoste

TSHOOT 2.0 certification covers the troubleshooting of EIGRP route redistribution into OSPFv3 networks. In this video; Raymond Lacoste demonstrates OSPFv2/OSPFv3 similarities; OSPFv3’s negation of the subnets keyword; and the use of the include-connected keyword to redistribute directly connected EIGRP interfaces.

70445
Tshoot 2.0: Troubleshooting Ripv2 And Ripng Raymond Lacoste

When preparing for the TSHOOT 2.0 certification; you should be familiar with a wide range of commands to successfully troubleshoot both RIPv2 and RIPng issues. In this video; Raymond Lacoste demonstrates the commands that you can use to troubleshoot RIPv2 and RIPng.

70374
Tshoot 2.0: Troubleshooting Router Features

TSHOOT 2.0 certification covers how to troubleshoot various problems with routers. In this video; Kevin Wallace reviews the options for troubleshooting router network services that have been covered in this series.

70487
Tshoot 2.0: Troubleshooting Routing: Routing Loops Raymond Lacoste

The TSHOOT 2.0 certification covers troubleshooting routing loops that occur during redistribution at the boundaries between routing domains. In this video; Raymond Lacoste demonstrates how to identify; isolate; and resolve routing loops resulting from multipoint; two-way redistribution.

70451
Tshoot 2.0: Troubleshooting Rstp And Mstp Dan Young

Preparation for the TSHOOT 2.0 certification requires an understanding of how to troubleshoot Rapid Spanning Tree Protocol (RSTP) and Multiple Spanning Tree Protocol (MSTP). You need to identify the symptoms of the problem; the potential causes; and how to resolve the problem. In this video; Dan Young discusses how to troubleshoot RSTP and MSTP.

70555
Tshoot 2.0: Troubleshooting Sdm Templates Dan Young

When preparing for the TSHOOT 2.0 certification; you should know how to troubleshoot SDM templates. And you should be aware of the features that can be affected by the templates; as well as how to manipulate the templates. In this video; Dan Young demonstrates how to troubleshoot SDM templates.

70547
Tshoot 2.0: Troubleshooting Static And Dynamic Address Assignment Raymond Lacoste

The TSHOOT 2.0 examination covers how to troubleshoot static and dynamic address assignments and assign IP addresses to devices on a network. In this video; Raymond Lacoste discusses the various address assignment methods that can be used for troubleshooting.

70335
Tshoot 2.0: Troubleshooting Stp Dan Young

Knowing how to troubleshoot Spanning Tree Protocol (STP) is important for the TSHOOT 2.0 certification. Some STP configuration issues include unexpected root bridge election; undesirable path selection; errors with MSTP; and the misuse of feature; such as LoopGuard and RootGuard. In this video; Dan Young demonstrates how to troubleshoot STP using examples.

70554
Tshoot 2.0: Troubleshooting The Stp Toolkit Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot Spanning Tree Protocol (STP). The STP Toolkit is a collection of STP extensions that can be used to improve performance. Elements of the toolkit include PortFast; BPDUGuard; BPDUFilter; RootGuard; LoopGuard; and UDLD. In this video; Dan Young discusses of the STP Toolkit.

70556
Tshoot 2.0: Troubleshooting Tools Kevin Wallace

The TSHOOT 2.0 certification covers the troubleshooting tools that you can use to define problems during troubleshooting. In this video; Kevin Wallace discusses some of the troubleshooting tools that you can use.

70396
Tshoot 2.0: Troubleshooting Tools Case Study Kevin Wallace

When preparing for the TSHOOT 2.0 examinations; you should be familiar with ways of interpreting the types of information available when dealing with certain problems. In this video; Kevin Wallace demonstrates the use of NetFlow as part of a troubleshooting case study.

70397
Tshoot 2.0: Troubleshooting Trunking: Partial Vlans Over A Trunk Dan Young

Preparing for the TSHOOT 2.0 certification requires knowledge about how to troubleshoot situations where not all VLANs have connectivity over a trunk. To troubleshoot these issues; you should know how to adjust allowed VLANs in a topology and how to troubleshoot a native VLAN mismatch. In this video; Dan Young demonstrates troubleshooting VLANs over a trunk.

70549
Tshoot 2.0: Troubleshooting Vlans Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot VLANs issues specific to VLAN operation; including incorrect port assignments; missing or inactive VLANs; and VLANs that have been shut down or suspended. In this video; Dan Young demonstrates how to ensure that a port is assigned to the correct VLAN.

70550
Tshoot 2.0: Troubleshooting Vlans: Inactive/suspended/shutdown Vlans Dan Young

Preparing for the TSHOOT 2.0 certification requires knowing how to troubleshoot inactive; suspended; or shutdown VLANs. This is useful; for instance; in a situation where a switchport is not forwarding traffic to ports in a VLAN. In this video; Dan Young demonstrates how to troubleshoot inactive VLANs.

70551
Tshoot 2.0: Troubleshooting Vrrp Overview Raymond Lacoste

When preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot issues with Virtual Router Redundancy Protocol (VRRP). There are several reasons why a VRRP router may not be forwarding traffic for clients on a subnet; or multiple masters might exist in a group. In this video; Raymond Lacoste discusses some of the common causes of VRRP problems.

70407
Tshoot 2.0: Troubleshooting Vtp Dan Young

When preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot VLAN Trunking Protocol (VTP). Some issues that affect VTP configuration include domain name mismatch; mode misuse; password mismatch; lack of trunk connectivity; and version mismatch. In this video; Dan Young discusses how to troubleshoot VTP.

70552
Tshoot 2.0: Using Ping And Traceroute Raymond Lacoste

The TSHOOT 2.0 certification covers how to use commands; such as ping and traceroute. The ping command can determine whether a router or PC has reachability to a remote IP address; while the traceroute command shows the path that packets take to their destination. In this video; Raymond Lacoste demonstrates how to use ping and traceroute in troubleshooting operations.

70343
Tshoot 2.0: Vacl Issues I Raymond Lacoste

The TSHOOT 2.0 certification covers how you can use the VLAN access control list (ACL) to select the traffic you want to filter between two devices within a VLAN. There are three items that you need to verify when working with VLAN ACLs. In this video; Raymond Lacoste discusses these three items.

70431
Tshoot 2.0: Syslog Issues

The TSHOOT 2.0 certification covers Syslog issues which can prohibit appliances from sending log messages to the server. In this video; Kevin Wallace uses specific troubleshooting steps to check for Syslog messages generated by a router; switch; host; or adaptive security.

70485
Tshoot 2.0: Traceroute Codes Raymond Lacoste

When preparing for the TSHOOT 2.0 certification; you need to understand when to use the traceroute command and the codes which may be returned. These include ‘nn msec’; ‘*’; ‘A’; ‘Q’; ‘I’; ‘U’; ‘H’; ‘N’; ‘P’; ‘T’; and ‘?’. In this video; Raymond Lacoste discusses the meanings of these codes.

70347
Tshoot 2.0: Traceroute Example Raymond Lacoste

The TSHOOT 2.0 certification covers the traceroute command which shows the path that packets take to their destination. While the path can be determined using ping; each IP address must be pinged whereas with traceroute only one command is required. In this video; Raymond Lacoste discusses the traceroute command in greater detail.

70346
Tshoot 2.0: Troubleshooting 802.1q Trunks Dan Young

When preparing for the TSHOOT 2.0 certification; you are required to know how to troubleshoot 802.1q trunks. For instance; in a situation where your default gateways cannot reach their clients. In this video; Dan Young demonstrates how to troubleshoot 802.1q trunks.

70548
Tshoot 2.0: Troubleshooting Advanced Ospfv3 Dan Young

The TSHOOT 2.0 certification assesses your ability to troubleshoot advanced OSPF configuration. This advanced configuration can be used for IPv4 and IPv6. In this video; Dan Young discusses the characteristics of advanced OSPF configuration; its relevance to IPv4; and IPv6; and how it differs from regular OSPF configuration.

70515
Tshoot 2.0: Troubleshooting Bgp Neighborship Dan Young

The TSHOOT 2.0 certification covers how you can detect and resolve issues with BGP neighborship. In this video; Dan Young discusses various errors that could affect BGB neighborship and the ways to resolve them.

70535
Tshoot 2.0: Troubleshooting Bgp Routing Dan Young

Preparation for the TSHOOT 2.0 certification requires knowing how to troubleshoot BGP routing. Some potential BGP routing update issues include bad network commands; easy route filtering; and poor path selection. In this video; Dan Young discusses how to troubleshoot BGP routing.

70539
Tshoot 2.0: Troubleshooting Fhrps Raymond Lacoste

The TSHOOT 2.0 certification covers a list of commands that you can use when troubleshooting HSRP; VRRP; and GLBP. These commands are useful because they allow you to verify priority; preemption; authentication; and object tracking. In most cases; this makes it unnecessary to perform debugging as well. In this video; Raymond Lacoste demonstrates troubleshooting First Hop Redundancy Protocols (FHRPs).

70417
Tshoot 2.0: Troubleshooting Hsrp Overview Raymond Lacoste

When preparing for the TSHOOT 2.0 examination; you need to be able to troubleshoot Hot Standby Router Protocol (HSRP) functionality. Most issues with HSRP will be a result of the wrong router forwarding traffic. In this video; Raymond Lacoste demonstrates the steps for assessing an HSRP issue.

70399
Tshoot 2.0: Troubleshooting Intervlan Routing

The TSHOOT 2.0 certification covers troubleshooting InterVLAN routing issues on a Layer 2 switch or a multilayer switch. In this video; Kevin Wallace demonstrates a few issues that could result from incorrect InterVLAN router configuration and reviews some common commands.

70471
Tshoot 2.0: Troubleshooting Layer 2 Etherchannel Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot layer 2 EtherChannel bundles. Some causes of EtherChannel bundle issues include protocol mismatching; layer 2 mismatching; and load-balancing. In this video; Dan Young demonstrates how to troubleshoot a layer 2 EtherChannel.

70553
Tshoot 2.0: Troubleshooting Layer 2 Forwarding Dan Young

The TSHOOT 2.0 certification requires an understanding of troubleshooting layer 2 forwarding. This involves the ability to analyze a MAC table and determine whether a switch knows how to reach a specific location. And you should know how to adjust the aging time for dynamic MAC addresses. In this video; Dan Young demonstrates troubleshooting layer 2 forwarding.

70546
Tshoot 2.0: Troubleshooting Mp-bgp Dan Young

For the purpose of the TSHOOT 2.0 certification; you are required to know the cause of multi-protocol BGP (MP-BGP) issues and what the appropriate resolution steps are. It is also important to understand how BGP communications and BGP configuration occurs. In this video; Dan Young demonstrates how to troubleshoot MP-BGP.

70545
Tshoot 2.0: Troubleshooting Named Eigrp Dan Young

When preparing for the TSHOOT 2.0 examination; you’re expected to know which issues are associated with a named EIGRP and how to resolve them. In this video; Dan Young discusses the differences and similarities between troubleshooting for EIGRP and troubleshooting for named EIGRP.

70534
Tshoot 2.0: Troubleshooting Neighborship In Eigrp For Ipv6 Dan Young

The TSHOOT 2.0 examination covers the differences between troubleshooting for IPv4 and IPv6; focusing on troubleshooting IPv6 EIRGP neighborship issues. In this video; Dan Young discusses neighborship issues in EIGRP and IPv6.

70533
Tshoot 2.0: Troubleshooting Neighborship In Ospfv3 Dan Young

When preparing for the TSHOOT 2.0 certification; you need to be able to troubleshoot OSPFv3 neighborship issues. You can do this by changing IP to IPv6 for all the relevant commands. In this video; Dan Young demonstrates how to troubleshoot OSPFv3 neighborship issues by highlighting the differences the between OSPFv2 and OSPFv3.

70513
Tshoot 2.0: Troubleshooting Ospfv2 Routing Issues Dan Young

In preparation for the TSHOOT 2.0 certification; you should understand how to troubleshoot OSPFv2 routing issues. There are several issues which may affect OSPF routing operation; including the interface not running the OSPF process; better source of information; route filtering; duplicate router IDs; and load balancing. In this video; Dan Young discusses these common issues and how they may arise.

70500
Tshoot 2.0: Troubleshooting Ospfv3 Overview Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot issues with OSPFv3. OSPFv3 is similar to OSPFv2 and enables you to do the same neighborship troubleshooting. However; OSPFv3 is a routing protocol for IPv6. In this video; Dan Young discusses the main features of OSPFv3.

70511
Tshoot 2.0: Troubleshooting Redistribution Into Eigrp For Ipv4 Raymond Lacoste

The TSHOOT 2.0 certification covers route redistribution into EIGRP for IPv4 using route maps. In this video; Raymond Lacoste demonstrates the need to define the seed metric of a route being redistributed into EIGRP IPv4 due to no default being available.

70447
Tshoot 2.0: Switch Virtual Interface (svi) Operation Issues

The TSHOOT 2.0 certification covers how to route traffic between different VLANs by creating a Switch Virtual Interface (SVI) operation. In this video; Kevin Wallace demonstrates how to identify and resolve any issues you might encounter when using a Switch Virtual Interface (SVI) Operation.

70463
Tshoot 2.0: Ripv2 Sample Configuration Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you should be able troubleshoot RIPv2 router operations. One of the reasons that RIP updates may not be received from a neighboring RIP router is that the interface on either the local or remote router is shut down. In this video; Raymond Lacoste demonstrates a sample RIPv2 configuration to troubleshoot this problem.

70350
Tshoot 2.0: Route Map Logic Raymond Lacoste

When preparing for the TSHOOT 2.0 examination; you need to understand route map logic. Route maps can be made up of one sequence or a whole bunch of sequences which are arranges in a specific sequence; or logic. In this video; Raymond Lacoste demonstrates how to apply logic to a route map.

70376
Tshoot 2.0: Route Maps For Redistribution Control Review Raymond Lacoste

The TSHOOT 2.0 certification covers how to troubleshoot route maps.The maps allow you to control which routes will be redistributed and which routes will not be redistributed. In this video; Raymond Lacoste demonstrates how to troubleshoot route maps during route distribution.

70375
Tshoot 2.0: Routed Port Operation: Port Configured For Switchport Operation

The TSHOOT 2.0 certification covers common issues related to routed port operation on a switch. In this video; Kevin Wallace demonstrates how to convert from a switchport to a routed port using interface configuration mode.

70468
Tshoot 2.0: Routed Ports

The TSHOOT 2.0 certification covers what you should do when a routed port has been misconfigured on a multilayer switch. In this video; Kevin Wallace demonstrates how to configure a routed port correctly.

70467
Tshoot 2.0: Router-on-a-trunk Configuration

The TSHOOT 2.0 certification covers the troubleshooting of router-on-a-trunk network topology. In this video; Kevin Wallace demonstrates the issues with a router-on-a-trunk configuration and how to troubleshoot them.

70459
Tshoot 2.0: Router-on-a-trunk Operation Issues

In preparing for the TSHOOT 2.0 certification; you need to be familiar with the router-on-a-trunk network topology; which can connect devices via VLANs. In this video; Kevin Wallis demonstrates this network topology and also possible causes of the network malfunctioning.

70458
Tshoot 2.0: Router-on-a-trunk Operation: Subinterface Parameters Incorrectly Set On Router

The TSHOOT 2.0 certification covers an incorrect router configuration as an issue with a router-on-a-trunk configuration. In this video; Kevin Wallace demonstrates how to identify and resolve an incorrect router configuration.

70462
Tshoot 2.0: Router-on-a-trunk Operation: Trunk Encapsulation

The TSHOOT 2.0 examination covers any issues you might have when dealing with a router-on-a-trunk configuration. In this video; Kevin Wallace demonstrates how to hard code the trunk configuration when relying on DTP is an issue and to solve the issue of the encapsulation type for a trunk being incorrect.

70460
Tshoot 2.0: Router-on-a-trunk Operation: Vlan Issues

The TSHOOT 2.0 certification covers how to resolve any issues that we might have when routing between VLANs and a router-on-a-trunk configuration. In this video; Kevin Wallace demonstrates how to make sure that the VLANs in your configuration do exist and to verify port membership in those VLANs.

70461
Tshoot 2.0: Routing Loops: Example Issue Raymond Lacoste

The TSHOOT 2.0 certification covers routing loops that may occur during multipoint; two-way redistribution at the boundaries of routing domains. In this video; Raymond Lacoste demonstrates how administrative distance may result in a routing loop.

70452
Tshoot 2.0: Routing Loops: Solution Raymond Lacoste

The TSHOOT 2.0 certification covers troubleshooting routing loops that occur during redistribution at the boundaries between routing domains. In this video; Raymond Lacoste demonstrates how to use route tagging to resolve a routing loop caused by administrative distance.

70453
Tshoot 2.0: Show Commands For Troubleshooting Routing Issues In Ospfv3 Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot OSPFv3 routing issues using the show commands. In this video; Dan Young demonstrates how to troubleshoot OSPFv3 using the show ip ipv6 ospf command and how to configure virtual links for OSPFv3.

70514
Tshoot 2.0: Snmp Issues

The TSHOOT 2.0 certification covers SNMP issues which result in SNMP trap notifications not being sent to the SNMP server. In this video; Kevin Wallace demonstrates how to enable; use; and remove traps to troubleshoot SNMP issues.

70486
Tshoot 2.0: Spoofing Mitigation Issues Raymond Lacoste

The TSHOOT 2.0 certification covers how you can mitigate against spoofing. Spoofing mitigation protects the network from rogue DHCP servers; ARP poisoning and IP spoofing; and issues may arise from misconfigured DHCP snooping; misconfigured DAI or a misconfigured IP source guard. In this video; Raymond Lacoste discusses issues related to spoofing mitigation.

70424
Tshoot 2.0: Structured Network Troubleshooting Kevin Wallace

The TSHOOT 2.0 certification covers several approaches to troubleshooting which helps you to solve problems which may occur; such as top down; bottom-up; and divide and conquer. In this video; Kevin Wallace demonstrates several approaches to structure troubleshooting in a network scenario.

70381
Tshoot 2.0: Svi Configuration

The TSHOOT 2.0 certification covers the basic configuration of a Switch Virtual Interface (SVI); which allows you to route between VLAN ports. In this video; Kevin Wallace demonstrates how to recognize a basic Switch Virtual Interface configuration.

70464
Tshoot 2.0: Svi Operation

The TSHOOT 2.0 certification covers any issues you might encounter when troubleshooting a Switch Virtual Interface (SVI) operation. In this video; Kevin Wallace demonstrates how to identify and resolve any issues related to an SVI.

70465
Tshoot 2.0: Svi Operation: No Ports In The Stp Forwarding State

The TSHOOT 2.0 certification covers establishing communication between the ports on a switch for two or more VLANs configured with a SVI. In this video; Kevin Wallace demonstrates how to configure the ports on a switch for a SVI on a VLAN and ensure that they are in the forwarding state.

70466
Tshoot 2.0: Ripv2 Operation Issues Raymond Lacoste

The TSHOOT 2.0 certification covers troubleshooting issues; including RIPv2 operation issues. There a number of reasons why RIPv2 routers may not exchange routes as expected; including interface shutdown; incorrect IP address on the interface and route filtering. In this video; Raymond Lacoste discusses these and other issues in greater detail.

70349
Tshoot 2.0: Ospfv2 Redistribution: Filters Ii Raymond Lacoste

The TSHOOT 2.0 certification covers the use of route maps to filter EIGRP route redistribution into an OSPFv2 autonomous system. In this video; Raymond Lacoste demonstrates how an incorrectly named route-map results in the denial of route redistribution throughout the OSPF network.

70444
Tshoot 2.0: Ospfv2 Redistribution: Metric-type Raymond Lacoste

The TSHOOT 2.0 certification covers troubleshooting metric types used when routes are redistributed from multiple distribution points into differing OSPFv2 network topologies. In this video; Raymond Lacoste demonstrates how to isolate; confirm; and correct metrics-related route redistribution issues.

70442
Tshoot 2.0: Ospfv2 Redistribution: Stub Area Raymond Lacoste

The TSHOOT 2.0 certification covers troubleshooting redistribution into an OSPFv2 network stub area. In this video; Raymond Lacoste demonstrates how to convert an OSPFv2 stub area into a not-so-stubby area and redistributes an autonomous system boundary router Type 7 LSA to the area border router.

70441
Tshoot 2.0: Ospfv2 Redistribution: Subnets Keyword Raymond Lacoste

The TSHOOT 2.0 certification covers the troubleshooting of route redistribution into an EIGRP autonomous system of OSPFv2 classless networks using subnet masking. In this video; Raymond Lacoste demonstrates how the redistribute command’s subnets keyword enables the redistribution of classless routes.

70440
Tshoot 2.0: Ospfv2 Route Summarization Dan Young

When preparing for the TSHOOT 2.0 certification; you should take into consideration the route summarization for OSPF when troubleshooting. Summarization occurs on the Autonomous System Boundary Routers and area-border router. In this video; Dan Young discusses the characteristics of route summarization; and demonstrates how to deal with it during the troubleshooting process.

70509
Tshoot 2.0: Ospfv3 Configuration Dan Young

When preparing for the TSHOOT 2.0 examination; you should understand basics of the syntax for OSPFv3 and how to configure it. In this video; Dan Young discusses the basics of OSPFv3 configuration; including a brief comparison between IPv4 and IPv6.

70512
Tshoot 2.0: Ospfv3 Redistribution: Include-connected Raymond Lacoste

TSHOOT 2.0 certification covers the redistribution of EIGRP routes and directly connected interfaces into OSPFv3 autonomous systems. In this video; Raymond Lacoste demonstrates how the include-connected keyword allows the redistribution of directly connected interfaces into OSPFv3.

70446
Tshoot 2.0: Ping Echo-reply Interpretation Raymond Lacoste

The TSHOOT 2.0 certification covers the ping command which can determine reachability to a remote IP address. There are a number of ping Echo-replies which may be received. These include ‘!’; ‘.’; ‘U’; ‘Q’; ‘M’; ‘?’; and ‘&’. In this video; Raymond Lacoste discusses how to interpret each of these results.

70345
Tshoot 2.0: Ping Example Raymond Lacoste

When preparing for the TSHOOT 2.0 examination; you should know how to use commands; such as ping. The ping command can determine whether a router or PC has reachability to a remote IP address. Extended pings can be used to modify default ping values. In this video; Raymond Lacoste demonstrates how to use the ping command during troubleshooting.

70344
Tshoot 2.0: Port Security Issues Overview Raymond Lacoste

When preparing for the TSHOOT 2.0 certification; you should understand the importance of port security and how to troubleshoot it. Some issues relating to port security include port security that is configured but not enabled and the configuration of static MAC addresses. In this video; Raymond Lacoste discusses issues relating to port security.

70418
Tshoot 2.0: Proxy Arp And Administrative Distance

When preparing for the TSHOOT 2.0 examination; you should understand how proxy ARP and Administrative Distance can impact performance. In this video; Kevin Wallace demonstrates how to improve performance by disabling proxy ARP and configuring an optimal Administrative Distance.

70455
Tshoot 2.0: Pvlans And Protected Port Issues Raymond Lacoste

The TSHOOT 2.0 certification covers how to deal with misconfigurations relating to private VLANs and protected ports. In this video; Raymond Lacoste demonstrates the process of identifying and dealing with these misconfigurations.

70428
Tshoot 2.0: Reading Prefix Lists Raymond Lacoste

The TSHOOT 2.0 certification covers how to redistribute the routes that match a particular prefix list. To troubleshoot redistribution; you need to know how to read the prefix list. In this video; Raymond Lacoste demonstrates how to correctly read prefix lists when troubleshooting redistribution.

70379
Tshoot 2.0: Ripng Operation Issues Raymond Lacoste

When preparing for the TSHOOT 2.0 certification; you should be able to diagnose and resolve RIP issues; including those regarding RIPng operation. RIPng routers may not exchange routes as expected and the interface may be shut down when the maximum hop-count is exceeded. In this video; Raymond Lacoste discusses these and other RIPng operation issues.

70363
Tshoot 2.0: Ntp Configuration Examples

TSHOOT 2.0 certification covers a basic configuration for both an NTP server and an NTP client on a network. In this video; Kevin Wallace demonstrates how to configure the internal time source for both the NTP client and NTP server

70482
Tshoot 2.0: Ntp Example Issues

The TSHOOT 2.0 certification covers troubleshooting synchronization that doesn’t happen as expected when configuring an NTP client and an NTP server. In this video; Kevin Wallace demonstrates how to correctly configure NTP on a network and how to find and rectify settings that have been configured incorrectly.

70483
Tshoot 2.0: Ntp Issues

As part of TSHOOT 2.0 certification; NTP allows a router to receive accurate time from the Internet. In this video; Kevin Wallace demonstrates troubleshooting methods for time-based router issues; such as access control lists blocking traffic; compensating for time zones; and how stratum values measure accuracy.

70481
Tshoot 2.0: Ntp Issues: Time Server Inaccessible

The TSHOOT 2.0 certification covers possible reasons and troubleshooting solutions for an incorrectly configured NTP on a network. In this video; Kevin Wallace demonstrates how to configure settings between devices on a network using NTP.

70484
Tshoot 2.0: Ospf Neighborship Issues Dan Young

When preparing for the TSHOOT 2.0 certification; you should be aware of Open Shortest Path First (OSPF) neighborship issues and how these issues can affect neighbor adjacencies. Some issues include an interface that is down or not running the OSPF process; mismatched timers; and mismatched Area IDs. In this video; Dan Young discusses OSPF neighborship issues.

70557
Tshoot 2.0: Ospfv2 Redistribution: Filters I Raymond Lacoste

The TSHOOT 2.0 certification covers the use of route maps to filter the redistribution of individual EIGRP routes into an OSPFv2 autonomous system. In this video; Raymond Lacoste demonstrates how to identify and isolate route-map filtering issues; which he resolves using the appropriate commands.

70443
Tshoot 2.0: Gre Configuration

The TSHOOT 2.0 certification covers GRE tunnels; which can carry most Layer 3 protocols; such as multicast to IP and IPX AppleTalk. In this video; Kevin Wallace demonstrates how to configure a GRE tunnel by mirroring configurations on either end of the tunnel.

70476
Tshoot 2.0: Gre Issues

The TSHOOT 2.0 certification covers GRE tunnelling and tunnel troubleshooting issues. In this video; Kevin Wallace demonstrates how to resolve the IP routing issues that may occur with GRE tunnels.

70477
Tshoot 2.0: Interpreting Route Maps For Redistribution I Raymond Lacoste

The TSHOOT 2.0 certification covers the how you can use a route map to redistribute routes from one routing protocol into another routing protocol. In this video; Raymond Lacoste demonstrates how use a route map to redistribute from the RIP protocol to into OSPF protocol.

70377
Tshoot 2.0: Interpreting Route Maps For Redistribution Ii Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you need to have an understanding of how to troubleshoot the redistribution from one routing protocol into another; using routing maps. In this video; Raymond Lacoste demonstrates troubleshooting redistribution by using an extended example.

70378
Tshoot 2.0: Ip Sla Issues

The TSHOOT 2.0 certification covers IP Service Level Agreement (SLA) troubleshooting. In this video; Kevin Wallace demonstrates how IP SLA can be used to generate traffic in a network in order to gather data about network behavior; and how to verify IP SLA configuration.

70472
Tshoot 2.0: Ipv4 And Ipv6 Acl Issues Raymond Lacoste

When preparing for the TSHOOT 2.0 certification; you need to be able to troubleshoot misconfiguration which may have occurred on access control lists (ACLs); especially on Extended ACLs. In this video; Raymond Lacoste discusses the various problems that may occur with an ACL and how you can resolve them.

70433
Tshoot 2.0: Ipv4 And Ipv6 Acl Issues Demonstration Raymond Lacoste

The TSHOOT 2.0 certification covers how you can analyze and solve errors concerning access control lists (ACLs); including errors with connections to a switch. In this video; Raymond Lacoste discusses how to troubleshoot a computer suddenly not being able to establish a Telnet session at a switch.

70436
Tshoot 2.0: Ipv4 Static Routing Issues

The TSHOOT 2.0 certification covers the issues you might have with IPv4 static routing. In this video; Kevin Wallace demonstrates some of the issues you may encounter when using static routing for IPv4; and how to troubleshoot them.

70454
Tshoot 2.0: Ipv6 Static Routing Issues

The TSHOOT 2.0 certification covers issues associated with IPv6 static routing. In this video; Kevin Wallace demonstrates the specific troubleshooting issues that can arise with IPv6 and static routes.

70456
Tshoot 2.0: Layer 2 Switching Process Kevin Wallace

In preparing for the TSHOOT 2.0 certification; it is recommended that you have an understanding of how Layer 2 switching works. In this video; Kevin Wallace explains the processes involved in Layer 2 switching.

70390
Tshoot 2.0: Layer 3 Etherchannel

The TSHOOT 2.0 certification covers the Layer 3 EtherChannel; which allows traffic to flow correctly between switches. In this video; Kevin Wallace demonstrates how to configure a Layer 3 EtherChannel.

70469
Tshoot 2.0: Layer 3 Etherchannel Protocols

The TSHOOT 2.0 certification covers troubleshooting of Layer 3 EtherChannel protocols. In this video; Kevin Wallace demonstrates troubleshooting ping errors on a Layer 3 EtherChannel; how incorrect order of operations or non-matching EtherChannel Protocols could be the cause of this; and how to fix the issue.

70470
Tshoot 2.0: Layer 3 Routing Process Kevin Wallace

When preparing for the TSHOOT 2.0 examination; you should be familiar with the Layer 3 routing process. In this video; Kevin Wallace discusses the processes involved in routing through Layer 3 within a network.

70391
Tshoot 2.0: Multiple Routing Sources

The TSHOOT 2.0 certification covers the filtering of IPv4 and IPv6 routes. In this video; Kevin Wallace demonstrates why a router selects its route by administrative distance; and uses a distribute-list to prevent unwanted routes being injected into its IPv4 or IPv6 routing table.

70457
Tshoot 2.0: Nat Example Issues

As part of the TSHOOT 2.0 certification; you will need to know how to troubleshoot NAT connection issues. In this video; Kevin Wallace demonstrates how to use the command line interface to check your NAT configuration; define interface devices; and deal with routing loops.

70480
Tshoot 2.0: Nat Issues

The TSHOOT 2.0 certification covers NAT; which translates address ranges from inside local addresses to inside global addresses. In this video; Kevin Wallace demonstrates how to use commands to configure router services in NAT.

70479
Tshoot 2.0: Network Documentation Kevin Wallace

When preparing for the TSHOOT 2.0 examination; you should be familiar with network documentation tasks and how to perform them. In this video; Kevin Wallace explains the creation; role; and storage of documentation logs for use when troubleshooting problems.

70388
Tshoot 2.0: Network Troubleshooting Procedures I Kevin Wallace

The TSHOOT 2.0 examination covers the procedures you need to follow during troubleshooting: define problem; gather information; analyze information; eliminate potential causes; propose hypothesis; test hypothesis; and solve problem and document the solution. In this video; Kevin Wallace demonstrates the fundamentals of troubleshooting and the procedures which should be followed.

70383
Tshoot 2.0: Network Troubleshooting Procedures Ii Kevin Wallace

In preparing for the TSHOOT 2.0 certification; you need to know the seven procedures you should follow during troubleshooting. These are define the problem; gather information; analyze information; eliminate potential causes; propose hypothesis; test hypothesis; and solve the problem and document the solution In this video; Kevin Wallace discusses the last five steps in the process.

70384
Tshoot 2.0: Glbp Operation Issues Ii Raymond Lacoste

Preparing for the TSHOOT 2.0 certification requires knowledge of the issues that may affect a Gateway Load Balancing Protocol (GLBP) operation. Examples of these issues include a GLBP router that is not forwarding traffic for clients on a subnet or multiple AVGs that exist per group. In this video; Raymond Lacoste discusses these issues.

70413
Tshoot 2.0: Configuration Maintenance Kevin Wallace

The TSHOOT 2.0 certification covers the importance of maintenance tasks; especially configuration maintenance; to ensure that all devices are connected to the network at all times. In this video; Kevin Wallace discusses configuration maintenance and why you should create automated backup options for a network.

70387
Tshoot 2.0: Creating A Baseline Kevin Wallace

When preparing for the TSHOOT 2.0 examination; you should know how to create a solid baseline of information for the purpose of cross-checking a network. In this video; Kevin Wallace demonstrates and explains the function of various tools that you can use to collect information about a network to create a performance baseline.

70389
Tshoot 2.0: Debug Commands Kevin Wallace

When preparing for the TSHOOT 2.0 certification; you should be familiar with debug commands. In this video; Kevin Wallace discusses the uses for debugging as well as precautions to consider.

70395
Tshoot 2.0: Diagnostic Principles Kevin Wallace

In preparing for the TSHOOT 2.0 certification; you need to be able to troubleshoot all issues; such as Internet connectivity issue with BGP; using these seven steps: define the problem; gather information; analyze the information; eliminate potential causes; propose hypothesis; test hypothesis; and solve document solution. In this video; Kevin Wallace discusses these seven key steps in problem resolution.

70380
Tshoot 2.0: Eigrp For Ipv4 Redistribution: Filters Raymond Lacoste

The TSHOOT 2.0 certification covers the use of route maps to filter route redistribution into an EIGRP autonomous system. In this video; Raymond Lacoste demonstrates how an incorrectly named route-map results in the denial of route redistribution throughout the EIGRP network.

70449
Tshoot 2.0: Eigrp For Ipv4 Redistribution: Unset Seed Metric Raymond Lacoste

TSHOOT 2.0 certification covers route redistribution into EIGRP for IPv4. In this video; Raymond Lacoste demonstrates how; in the absence of a default; to define the metric of OSPF routes being redistributed into EIGRP IPv4 using the redistribute command.

70448
Tshoot 2.0: Eigrp Neighborship Issues Dan Young

When preparing for the TSHOOT 2.0 certification; you should be aware of the problems which may arise with EIGRP neighborship and how to troubleshoot these issues. In this video; Dan Young introduces many possible causes of neighborship issues with EIGRP.

70516
Tshoot 2.0: Eigrp Routing Issue: Auto Summarization Dan Young

When preparing for the TSHOOT 2.0 examination; you should be able to detect and repair issues associated with automatic summarization and EIGRP routing issues. In this video; Dan Young demonstrates how auto summarization affects connectivity and how to troubleshoot it.

70531
Tshoot 2.0: Eigrp Routing Issue: Load Balancing Dan Young

When preparing for the TSHOOT 2.0 examination; you’re expected to know about EIGRP routing issues as they relate to load balancing. In this video; Dan Young discusses load balancing in EIGRP and how to troubleshoot ineffective load balancing.

70532
Tshoot 2.0: Eigrp Routing Issue: Route Filtering Dan Young

The TSHOOT 2.0 examination covers troubleshooting routing issues associated with filtering and EIGRP. In this video; Dan Young discusses how to troubleshoot the connectivity issues associated with filtering and EIGRP routing.

70528
Tshoot 2.0: Eigrp Routing Issue: Split Horizon Dan Young

In preparation for the TSHOOT 2.0 examination; you should know how to troubleshoot problems in EIGRP associated with using the split-horizon command. In this video; Dan Young describes how split-horizon can prevent a route from being advertised between spoke routers across a hub configured on a multipoint subinterface.

70530
Tshoot 2.0: Eigrp Routing Issue: The Eigrp Stub Option Dan Young

When preparing for the TSHOOT 2.0 examination; you’re expected to know how to troubleshoot routing issues associated with the EIGRP stub options. In this video; Dan Young discusses the arguments that you can use with the EIRGP stub and which options can cause errors.

70529
Tshoot 2.0: Eigrp Routing Issues Dan Young

When preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot EIGRP routing issues. While EIGRP is easier to configure than other protocols; issues may still arise with; for example; a bad or missing network command; better source of information; route filtering or load balancing. In this video; Dan Young discusses these issues in greater detail.

70525
Tshoot 2.0: Fhrp Object Tracking

The TSHOOT 2.0 certification covers FHRP enhanced object tracking and the conditions that could cause it to fail. In this video; Kevin Wallace demonstrates how to ascertain whether a tracked interface is in an up-up state and has an IP address.

70475
Tshoot 2.0: Fhrp Object Tracking Issues And Configuration

The TSHOOT 2.0 certification covers the First Hop Redundancy Protocols (FHRPs); such as HSRP; used to provide redundancy on default gateways. In this video; Kevin Wallace demonstrates how to create an HSRP enhanced tracking object to monitor an interface’s line-protocol state and other objects.

70473
Tshoot 2.0: Fhrp Object Tracking: Interfaces

The TSHOOT 2.0 certification covers tracking active and standby router interfaces for conditions that might prevent HSRP from performing as expected. In this video; Kevin Wallace demonstrates how to check that an interface is enabled for IP routing and that it is functioning.

70474
Tshoot 2.0: Filtering Show Commands I Kevin Wallace

The TSHOOT 2.0 certification covers the commands that offer large amounts of output. Command modifiers can cut through this output to bring you to the information of interest. In this video; Kevin Wallace discusses some of the frequently-used command modifiers that can be used.

70392
Tshoot 2.0: Filtering Show Commands Ii Kevin Wallace

When preparing for the TSHOOT 2.0 examination; you should have knowledge of the command modifiers that you can use with show commands. In this video; Kevin Wallace demonstrates some command modifiers; explains what they do; and when to use them.

70393
Tshoot 2.0: Glbp Operation Issues I Raymond Lacoste

The TSHOOT 2.0 certification covers the Gateway Load Balancing Protocol (GLBP) operation and the issues that can affect it. You should also understand how GLBP provides load balancing and how GLBP is affected by object tracking and preemption. In this video; Raymond Lacoste discusses the issues that affect a GLBP operation.

70412
Tshoot 2.0: Common Maintenance Tasks Kevin Wallace

When preparing for the TSHOOT 2.0 examination; you need to ensure that you know how to conduct common maintenance tasks on a network. You can perform scheduled maintenance to avoid any disruptions to the network. In this video; Kevin Wallace discusses what maintenance tasks entail and why they are necessary.

70386
Tshoot 2.0 – Spoofing Mitigation Issues: Misconfigured Dhcp Snooping Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot spoofing mitigation issues; including misconfigured DHCP snooping. DHCP snooping protects against DHCP spoofing attacks by preventing rogue DHCP servers from handing out IP addresses to clients within your network. In this video; Raymond Lacoste discusses some of the issues related to misconfigured DCHP snooping.

70425
Tshoot 2.0 – Spoofing Mitigation Issues: Misconfigured Ip Source Guard Raymond Lacoste

When preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot spoofing mitigation issues; including misconfigured IP source guard. IP source guard protects against IP address spoofing by matching packets with the IP address of the source device. In this video; Raymond Lacoste discusses how to diagnose and resolve issues with IP source guard configuration.

70427
Tshoot 2.0 – Troubleshooting Aaa: Method List Issues Raymond Lacoste

When preparing for the TSHOOT 2.0 examination; you should be familiar with AAA authentication methods; and troubleshooting them. AAA is a more scalable solution for authenticating users when they need management access to routers and switches. In this video; Raymond Lacoste discusses the steps for troubleshooting AAA authentication; focusing on the method lists; and RADIUS servers.

70437
Tshoot 2.0 – Vrrp Operation: Client Configured With Incorrect Ip Address Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot issues with Virtual Router Redundancy Protocol (VRRP) operation; including where the client has been configured with an incorrect IP address. In this video; Raymond Lacoste demonstrates how to identify and resolve this issue.

70410
Tshoot 2.0 – Vrrp Operation: Interface/object Tracking Has Lowered Priority Raymond Lacoste

The TSHOOT 2.0 certification covers the importance of object tracking in a VRRP operation. This enables you to convert a backup router into the master; for example; or examine why a VRRP router is not the master for a VRRP group. In this video; Raymond Lacoste demonstrates object tracking in a VRRP operation.

70411
Tshoot 2.0 – Vrrp Operation: Preemption Misconfiguration Raymond Lacoste

The TSHOOT 2.0 certification covers how to troubleshoot issues with Virtual Router Redundancy Protocol (VRRP) operation; including preemption misconfiguration. As preemption is enabled by default with VRRP; issues typically arise where it has been disabled and the virtual router master is consequently different than expected. In this video; Raymond Lacoste demonstrates how to identify and resolve these issues.

70409
Tshoot 2.0: 802.1x Port Based Authentication Troubleshooting Raymond Lacoste

The TSHOOT 2.0 certification covers issues related to troubleshooting 802.1x port-based authentication on a Catalyst switch; such as checking if AAA is enabled and if the radius server is available and responding. In this video; Raymond Lacoste discusses a troubleshooting checklist as well as the commands to use for troubleshooting and resolving the various issues.

70438
Tshoot 2.0: Acl Analysis Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you should be able to analyze and solve problems concerning access control lists (ACLs); including errors with connections to a server. In this video; Raymond Lacoste discusses how to troubleshoot a computer not being able to establish a connection to the server with the Telnet protocol using a specific example.

70435
Tshoot 2.0: Acl And Mtu Issues

The TSHOOT 2.0 certification covers reasons why traffic might not be flowing over a GRE tunnel; as well as possible solutions to rectify this problem. In this video; Kevin Wallace demonstrates some of the solutions to no or slow data transfer using a GRE tunnel configuration on multiple routers.

70478
Tshoot 2.0: Basic Hardware Diagnostic Kevin Wallace

When preparing for the TSHOOT 2.0 examination; you should know how to diagnose problems with hardware. In this video; Kevin Wallace demonstrates commands; how to interpret the information they provide; and how to act accordingly.

70394
Tshoot 2.0: Bgp Filtering And Administrative Distance Dan Young

Preparing for the TSHOOT 2.0 certification requires an understanding of BGP filtering and administrative distances. And you will also need to know how to troubleshoot BGP issues; such as when specific BGP routes are not being received. In this video; Dan Young provides demonstrates how to troubleshoot issues with BGP filtering and administrative distances.

70543
Tshoot 2.0: Bgp Neighborship: Incorrect Neighbor Statement Dan Young

When preparing for the TSHOOT 2.0 examination; you’re expected to know how incorrect neighbour statement affects BGP neighborships. In this video; Dan Young discusses how to troubleshoot neighborship issues that are caused by an incorrect neighbour statement.

70537
Tshoot 2.0: Bgp Neighborship: No Layer 3 Or Layer 4 Connectivity Dan Young

The TSHOOT 2.0 examination covers BGP neighborship adjacency issues and how you can troubleshoot layer 3 and layer 4 connectivity. In this video; Dan Young demonstrates troubleshooting an idle connection on layer 3.

70536
Tshoot 2.0: Bgp Neighborship: Ttl Expiration Dan Young

When preparing for the TSHOOT 2.0 certification; you should understand BGP neighborships; specifically in terms of TTL expiration. In this case; the TTL of a BGP packet expires because neighborship is not between directly connected devices. In this video; Dan Young discusses BGP neighborships and TTL expiration.

70538
Tshoot 2.0: Bgp Route Selection Process Dan Young

Preparing for the TSHOOT 2.0 certification requires an understanding of the BGP route selection process. There are 11 steps; but the key steps involve weight; local preference; autonomous system path; and MED. In this video; Dan Young discusses the BGP route selection process.

70544
Tshoot 2.0: Bgp Routing: Ibgp Split-horizon Dan Young

The TSHOOT 2.0 certification requires knowledge of the iBGP split-horizon rule and how this rule can prevent iBGP-learned routes from passing to downstream iBGP neighbors. It is also important to know how to resolve this issue – for instance; building a full mesh of iBGP peers. In this video; Dan Young provides discusses the iBGP split-horizon rule.

70542
Tshoot 2.0: Bgp Routing: Missing Or Erroneous Network Command Dan Young

When preparing for the TSHOOT 2.0 certification; you should understand BGP routing issues. One issue is a missing or bad network command; which could be caused by a network command that is not configured or a network interface that is down. In this video; Dan Young discusses this issue and how it can be resolved.

70540
Tshoot 2.0: Bgp Routing: Unreachable Ipv4 Next Hop Dan Young

When preparing for the TSHOOT 2.0 certification; you should be familiar with the BGP routing issue that arises from an unreachable IPv4 next hop. This means that a network will not be successfully advertised via BGP. In this video; Dan Young demonstrates how to troubleshoot an unreachable IPv4 next hop.

70541
Tshoot 2.0: Cisco Eem Kevin Wallace

The TSHOOT 2.0 certification covers the Cisco’s Embedded Event Manager (EEM); which allows you to create custom events and take action correspondingly in response to events. In this video; Kevin Wallace discusses the EEM and provides examples on how to use it.

70398
Tshoot 2.0 – Spoofing Mitigation Issues: Misconfigured Dai Raymond Lacoste

The TSHOOT 2.0 certification assesses your ability to troubleshoot spoofing mitigation issues including misconfigured Dynamic ARP Inspection (DAI). DAI is used to protect against ARP cache poisoning where a malicious user sends gratuitous ARPs to capture frames. In this video; Raymond Lacoste discusses how DAI may be misconfigured and how to resolve this issue.

70426
Tshoot 2.0 – Ripng Operation: Interface Is Not Enabled For Ripng Process Raymond Lacoste

The TSHOOT 2.0 examination covers your ability to diagnose and resolve issues with RIPng operation; including where the interface is not enabled for the RIPng process. You can use the ipv6 rip command to enable this. In this video; Raymond Lacoste demonstrates how to identify and resolve issues where an interface has not been enabled for RIPng.

70488
Tshoot 2.0 – Ripng Operation: Interface Is Shutdown Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you should be able to diagnose and resolve issues with RIPng operation; including where an interface is shutdown. Interfaces must be in the up-up state for RIPng operation. In this video; Raymond Lacoste demonstrates how to identify and remedy this issue.

70365
Tshoot 2.0 – Ripng Operation: Ipv6 Routing Not Enabled Raymond Lacoste

The TSHOOT 2.0 certification covers how to diagnose and resolve issues with RIPng operation; including IPv6 routing not being enabled. Ipv6 routing and IPv6 unicast routing are essential to RIPng operation; and if IPv6 unicast routing is accidentally removed; all RIPng configuration is lost. In this video; Raymond Lacoste discusses these issues in greater detail.

70364
Tshoot 2.0 – Ripng Operation: Load Balancing Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you need to know how to troubleshoot load balancing. By default RIPng is configured to load balance across 16 equal-metric paths or equal-cost paths; but you may need to configure it if maximum paths number is too high or low. In this video; Raymond Lacoste demonstrates how troubleshoot load balancing issues.

70373
Tshoot 2.0 – Ripng Operation: Max Hop Count Exceeded Raymond Lacoste

The TSHOOT 2.0 certification assesses your ability to diagnose and resolve issues with RIPng operation; including where the maximum hop count has been exceeded. As with RIPv2; RIPng has a maximum hop count of 15; and if this is exceeded it is classified as unreachable. In this video; Raymond Lacoste explains how to identify and remedy this issue.

70367
Tshoot 2.0 – Ripng Operation: Route Filtering I Raymond Lacoste

The TSHOOT 2.0 certification assesses your ability to diagnose and resolve issues with RIPng operation; including issues with route filtering. Route filtering with RIPng uses the distribute list command with a prefix list to identify routes to be filtered; and these are the focus of troubleshooting operations. In this video; Raymond Lacoste explains how to identify and remedy these issues.

70368
Tshoot 2.0 – Ripng Operation: Route Filtering Ii Raymond Lacoste

The TSHOOT 2.0 certification assesses your ability to diagnose and resolve issues with RIPng operation; including issues with route filtering. Route filtering with RIPng uses the distribute list command with a prefix list to identify routes to be filtered. In this video; Raymond Lacoste demonstrates how to identify and resolve these issues.

70369
Tshoot 2.0 – Ripng Operation: Split Horizon Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you need to diagnose and resolve issues with RIPng operation; including the split horizon rule. The split horizon rule prevents routes from being advertised on the same interface where they were received. In this video; Raymond Lacoste explains how problems arise when using a hub-and-spoke topology and how they can be resolved.

70370
Tshoot 2.0 – Ripv2 Operation: Acls Raymond Lacoste

The TSHOOT 2.0 certification covers how to troubleshoot RIPv2 operations; including how to identify access control lists (ACLs) which were denying RIP updates. In this video; Raymond Lacoste demonstrates how to identify these ACLs; outlining the methods through an example.

70361
Tshoot 2.0 – Ripv2 Operation: Authentication Incorrectly Configured Raymond Lacoste

The TSHOOT 2.0 certification covers the methods of troubleshooting authentication of the RIP protocol. In this video; Raymond Lacoste discusses the problems that could occur with authentication on a RIP network and how to troubleshoot and resolve them.

70355
Tshoot 2.0 – Ripv2 Operation: Auto-summarization I Raymond Lacoste

The TSHOOT 2.0.certification covers how to troubleshoot automatic summarization in discontiguous subnets. These subnets occur when the network is split up or separated by completely different classes of addresses. In this video; Raymond Lacoste discusses how automatic summarization is enabled for RIPv2 and why it can become an issue in discontiguous subnets.

70358
Tshoot 2.0 – Ripv2 Operation: Auto-summarization Ii Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you should be able to determine if discontiguous networks are present and assess whether automatic network summarization has occurred. In this video; Raymond Lacoste demonstrates how automatic summarization is enabled for RIPv2 in an example.

70359
Tshoot 2.0 – Ripv2 Operation: Bad Or Missing Network Statement Raymond Lacoste

When preparing for the TSHOOT 2.0 certification; you need to understand how to troubleshoot RIPv2 router operations. One such issue is a bad or missing network statement. If this is the case the appropriate interfaces will not be enabled for the RIP routing process. In this video; Raymond Lacoste demonstrates how to identify and resolve this issue.

70352
Tshoot 2.0 – Ripv2 Operation: Better Source Of Information Raymond Lacoste

When preparing for the TSHOOT 2.0 examination; you should be able to troubleshoot possible reasons for slow traffic flow. For example; slow traffic flow could be due the presence of another source of routing information. In this video; Raymond Lacoste discusses how to ensure traffic is flowing efficiently between routes; outlining the troubleshooting requirements of the process.

70360
Tshoot 2.0 – Ripv2 Operation: Interface Is Shutdown Raymond Lacoste

The TSHOOT 2.0 certification covers troubleshooting RIPv2 router operations. One of the reasons that RIP updates may not be received from a neighboring RIP router is that the IP addresses assigned to the router interfaces on the same segment belong to different subnets. In this video; Raymond Lacoste explains how this may be identified and resolved.

70351
Tshoot 2.0 – Ripv2 Operation: Load Balancing Raymond Lacoste

The TSHOOT 2.0 certification covers RIPv2 operation issues; including load balancing. In an environment with multiple paths of equal cost; the RIP router should be taking advantage of them; and if not may indicate a configuration problem. In this video; Raymond Lacoste demonstrates how to diagnose and resolve issues with load balancing.

70362
Tshoot 2.0 – Ripv2 Operation: Max Hop-count Exceeded Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you need to be aware of the maximum hop count when designing RIP networks. In this video; Raymond Lacoste discusses the importance of the hop count in the functioning of a network as well as how to use offset lists to change the destination network.

70354
Tshoot 2.0 – Ripv2 Operation: Passive Interface Raymond Lacoste

In preparation for the TSHOOT 2.0 certification; you need to be familiar with the passive interface feature and the role it plays in sending and receiving RIP updates. In this video; Raymond Lacoste describes the role of the passive interface feature in RIP updates and demonstrates where RIP updates occur in a network.

70353
Tshoot 2.0 – Ripv2 Operation: Route Filtering Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you need to be able to troubleshoot route filtering. This includes troubleshooting distribute lists as well as access control or prefix lists. In this video; Raymond Lacoste discusses the purpose of route filtering and how to troubleshoot issues with it.

70356
Tshoot 2.0 – Ripv2 Operation: Split Horizon Raymond Lacoste

When preparing for the TSHOOT 2.0 examination; you need to understand the split horizon rule. Applying this rule prevents the hub from relaying routing information down to the spokes. In this video; Raymond Lacoste discusses the split horizon rule within the routing protocol sphere.

70357
Tshoot 2.0 – Ospfv2 Neighborship: No Common Subnet Dan Young

When preparing for TSHOOT 2.0; you should understand that with OSPFv2 router adjacency depends on the routers being in the same subnet. However; this is not an issue with OSPFv3 because it uses link-local addresses. In this video; Dan Young discusses the OSPFv2 requirements for router adjacency; and how to deal with the effects this has on IP addressing.

70494
Tshoot 2.0 – Ospfv2 Neighborship: No Dr Dan Young

The TSHOOT 2.0 certification covers the tasks involved when troubleshooting router issues in Cisco IP networks. In this video; Dan Young demonstrates the process of choosing a designated router (DR) as well as prohibiting routers from becoming a DR.

70493
Tshoot 2.0 – Ospfv2 Neighborship: Passive Interface Dan Young

When preparing for the TSHOOT 2.0 certification; you should be familiar with the passive interface command in relation to OSPF and EIGRP. In this video; Dan Young discusses the effects of a passive interface and explains how to deal with the consequences.

70492
Tshoot 2.0 – Ospfv2 Routing Issue: Better Routing Source Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot OSPFv2 routing issues; such as where there is a better routing source. Administrative distance is an important consideration when multiple sources are injecting into the same destination; and it may be manipulated for static and redistributed routes. In this video; Dan Young discusses how to resolve issues that may arise.

70504
Tshoot 2.0 – Ospfv2 Routing Issue: Down Interface Dan Young

When preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot OSPFv2 routing issues; such as an interface being down. If a network is not being advertised into the autonomous system; it may be because the interface is down and therefore isn’t advertising the route. In this video; Dan Young demonstrates how to identify and resolve this issue.

70508
Tshoot 2.0 – Ospfv2 Routing Issue: Duplicate Router Ids Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot OSPFv2 routing issues; such as Duplicate Router IDs. Router IDs on any routing protocol are intended to be a unique identifier; so when one is duplicated in the autonomous system it is problematic. In this video; Dan Young demonstrates how to identify and resolve issues with Duplicate Router IDs.

70501
Tshoot 2.0 – Ospfv2 Routing Issue: Incorrect Dr Elected Dan Young

When preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot OSPFv2 routing issues; including where an incorrect designated router (DR) has been elected. The DR doesn’t need to be controlled on an Ethernet network; however it is an issue with non-Broadcast multi-access (NBMA) networks. In this video; Dan Young demonstrates how to identify and resolve this issue.

70502
Tshoot 2.0 – Ospfv2 Routing Issue: Load Balancing Dan Young

The TSHOOT 2.0 certification covers the issues which may arise with load balancing on OSPFv2. The interior gateway protocols; including OSPF; RIP; and EIGRP can be constrained to not load balance. In this video; Dan Young demonstrates how to troubleshoot these issues; and discusses possible solution relating to cost.

70510
Tshoot 2.0 – Ospfv2 Routing Issue: Network Command Issues Dan Young

The TSHOOT 2.0 certification assesses your ability to troubleshoot OSPFv2 routing operation; including network command issues. If a network is not being advertised into the autonomous system; it may be because there is no network command specifying the interface. In this video; Dan Young demonstrates how to identify and resolve this issue.

70503
Tshoot 2.0 – Ospfv2 Routing Issue: Stub Area Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot problems with OSPFv2 routing; including stub area issues. If there is suboptimal route selection when traffic is leaving the OSPF area; one of the causes may be multiple Area Border Routers (ABRs) in a stub area. In this video; Dan Young demonstrates how to identify and resolve this issue.

70507
Tshoot 2.0 – Port Security Issue: Maximum Macs Per Port Reached I Raymond Lacoste

The TSHOOT 2.0 certification assesses your ability to troubleshoot port security issues; including where the maximum MACs per port has been reached. By default the maximum number of MAC addresses that will be learned on a port is one; and if this is exceeded a violation occurs. In this video; Raymond Lacoste discusses the three violation modes that may occur.

70421
Tshoot 2.0 – Port Security Issue: Maximum Macs Per Port Reached Ii Raymond Lacoste

The TSHOOT 2.0 certification covers how to troubleshoot port-security issues; including where the maximum MACs per port has been reached. By default the maximum number of MAC addresses learned on a port is one; and if this is exceeded a violation occurs. In this video; Raymond Lacoste demonstrates what happens when the number of MAC addresses is exceeded.

70422
Tshoot 2.0 – Port Security Issue: Static Mac Address Misconfigured Raymond Lacoste

When preparing for the TSHOOT 2.0 certification; you should be aware of various port security issues; including a situation where a static MAC address has been configured incorrectly. This could result in a user being unable to access resources. In this video; Raymond Lacoste provides an overview of this issue.

70420
Tshoot 2.0 – Port Security Issue: Sticky Mac Addresses Not Saved Raymond Lacoste

The TSHOOT 2.0 certification assesses your ability to troubleshoot port security issues; including where sticky MAC addresses are not saved. Sticky learning is when the switch dynamically learns MAC addresses before converting them into a static address to be used in running-configuration. In this video; Raymond Lacoste discusses the issues that may arise with sticky learning.

70423
Tshoot 2.0 – Port Security Issues: Not Enabled On Interface Raymond Lacoste

The TSHOOT 2.0 certification covers the importance of enabling port security on the interface after port security has been configured. The switchport port-security command is used to enable port security. In this video; Raymond Lacoste discusses port security and demonstrates how to enable security on the interface.

70419
Tshoot 2.0 – Pvlans And Protected Port Issues: Pvlans Community Vlan Raymond Lacoste

When preparing for the TSHOOT 2.0 examination; you need to be familiar with troubleshooting VLANs. There are several questions regarding VLANs that you need to ask to thoroughly assess an unresponsive VLAN. In this video; Raymond Lacoste demonstrates how to assess an unresponsive VLAN and the steps to resolve the issue.

70429
Tshoot 2.0 – Pvlans And Protected Port Issues: Pvlans Isolated Vlan Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you should be familiar with troubleshooting issues with Isolated VLANs; including server communication. In this video; Raymond Lacoste demonstrates how to resolve the problem of servers communicating with each other; when they shouldn’t be.

70430
Tshoot 2.0 – Ripng Operation: Acls Raymond Lacoste

The TSHOOT 2.0 certification covers how to resolve RIPng routing issues. RIPng uses UDP port 521 to exchange routing updates. Access control lists (ACLs) can prevent this port from sending and receiving routing updates. In this video; Raymond Lacoste demonstrates how to troubleshoot RIPngs which are not exchanging routes.

70372
Tshoot 2.0 – Ripng Operation: Better Source Of Information Raymond Lacoste

The TSHOOT 2.0 certification covers the diagnosing and resolving of issues with RIPng operation; including issues with a better source of information. RIPng has an administrative distance (AD) of 120; and a routing source with a lower AD may be used to inject the route into the routing table. In this video; Raymond Lacoste explains better source of information issues.

70371
Tshoot 2.0 – Ospfv2 Neighborship: Mismatched Network Type Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot issues with OSPFv2 neighborship; including mismatched network type. One of the key challenges when running OSPF in Frame Relay is ensuring the network types are compatible with each other. In this video; Dan Young demonstrates how to identify and resolve network type issues with OSPFv2 neighborship.

70499
Tshoot 2.0 – Glbp Operation: Client Configured With Incorrect Ip Address Raymond Lacoste

The TSHOOT 2.0 certification covers why it’s important for a client to use the correct virtual IP address as their default gateway. An incorrect address will result in the client being unable to send traffic off its local subnet. In this video; Raymond Lacoste demonstrates how to verify a virtual IP address.

70415
Tshoot 2.0 – Glbp Operation: Interface/object Tracking Has Lowered Priority Raymond Lacoste

When preparing for the TSHOOT 2.0 certification; you should understand how object tracking is implemented with GLBP. This enables you to identify issues upstream from the Actual Virtual Forwarder (AVF); and troubleshoot situations whereby a GLBP router isn’t an AVF for a GLBP group MAC address. In this video; Raymond Lacoste demonstrates object tracking in a GLBP operation.

70416
Tshoot 2.0 – Glbp Operation: Preempt Option Not Set Raymond Lacoste

When preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot the GLBP operation; specifically when a GLBP router is not acting as an AVG for a GLBP group. In this video; Raymond Lacoste demonstrates the GLBP operation and configures levels of priority and the preempt option.

70414
Tshoot 2.0 – Hsrp Operation: Authentication Misconfigured Raymond Lacoste

The TSHOOT 2.0 certification covers to troubleshoot issues with Hot Standby Router Protocol (HSRP) operation; including where authentication has been misconfigured. HSRP authentication protects against rogue routers in a group; and troubleshooting this depends on whether key chains or key strings are used. In this video; Raymond Lacoste demonstrates the troubleshooting of HSRP authentication.

70406
Tshoot 2.0 – Hsrp Operation: Client Configured With Incorrect Ip Address Raymond Lacoste

When preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot issues with Hot Standby Router Protocol (HSRP) operation; including where the client is configured with an incorrect IP address. In this video; Raymond Lacoste demonstrates how to troubleshoot this issue.

70403
Tshoot 2.0 – Hsrp Operation: Interface/object Tracking Has Lowered Priority Raymond Lacoste

The TSHOOT 2.0 examination covers how to troubleshoot issues when a router has had its priority lowered by interface or object tracking. To do this; you need to configure the Hot Standby Router Protocol (HSRP). In this video; Raymond Lacoste demonstrates how to identify and resolve this issue.

70404
Tshoot 2.0 – Hsrp Operation: Peers Using Different Versions Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot issues with Hot Standby Router Protocol (HSRP) operation; including where peers are using different versions. In this video; Raymond Lacoste demonstrates how to identify and resolve this issue.

70405
Tshoot 2.0 – Hsrp Operation: Preempt Option Not Set Raymond Lacoste

The TSHOOT 2.0 is a certification covers how you can determine which router will be the active forwarder and take over the active forwarding role. In this video; Raymond Lacoste demonstrates how ensure that a specific router is the active forwarder for an HSRP group.

70400
Tshoot 2.0 – Hsrp Operation: Priority Not Correctly Set Raymond Lacoste

The TSHOOT 2.0 certification covers how to troubleshoot issues with Hot Standby Router Protocol (HSRP) operation; including where priority is not correctly set. This may lead to an HSRP router not becoming the Active router for the HSRP group. In this video; Raymond Lacoste demonstrates how to identify and resolve this issue.

70401
Tshoot 2.0 – Hsrp Operation: Virtual Ip Address Incorrectly Assigned Raymond Lacoste

The TSHOOT 2.0 certification covers how to troubleshoot issues with the Hot Standby Router Protocol (HSRP) operation; including where the virtual IP address is incorrectly assigned. When this occurs; the active router fails and the standby router assumes the role but is unable to forward traffic. In this video; Raymond Lacoste demonstrates how to identify and resolve this issue.

70402
Tshoot 2.0 – Ospf Neighborship: Acl Issue Dan Young

In preparing for the TSHOOT 2.0 certification; you should be familiar with the roles of ACLs; and understand how they can affect OSPF servers when misconfigured. In this video; Dan Young demonstrates how to troubleshoot when an ACL is blocking traffic it shouldn’t be; resulting in a loss of neighborship.

70496
Tshoot 2.0 – Ospf Neighborship: Timer Issues Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot timers when there is a timer discrepancy. For OSPF; the timers have to match precisely. In this video; Dan Young discusses the particular traits of timers with OSPF; and demonstrates how to troubleshoot a timer error.

70497
Tshoot 2.0 – Ospf Routing Issue: Route Filtering Dan Young

In preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot OSPF routing problems; including route filtering issues. A route may not be advertised if it’s being filtered. This may arise if a distribute list is denying the network or if there are administrative distance issues. In this video; Dan Young demonstrates how to resolve these issues.

70505
Tshoot 2.0 – Ospf Routing Issue: Virtual Links Dan Young

The TSHOOT 2.0 certification assesses your ability to troubleshoot OSPF routing issues including virtual links. Virtual links can be used to bind together the network; and issues may arise if a non-backbone area has no Area Border Router (ABR) connecting to the backbone area. In this video; Dan Young demonstrates how to identify and resolve these issues.

70506
Tshoot 2.0 – Ospfv2 Neighborship: Authentication Issue Dan Young

The TSHOOT 2.0 certification covers the concept of authentication and how it allows you to control neighborships in OSPF. In this video; Dan Young discusses the different methods of authentication when dealing with OSPFv2; and how it can be implemented at multiple levels.

70495
Tshoot 2.0 – Ospfv2 Neighborship: Interface Is Down Dan Young

The TSHOOT 2.0 examination will assess your knowledge and skills when troubleshooting issues with Cisco IP networks and their maintenance. In this video; Dan Young discusses the process of troubleshooting issues with interfaces; such as if an interface is down.

70489
Tshoot 2.0 – Ospfv2 Neighborship: Mismatched Area Dan Young

The TSHOOT 2.0 certification assesses your understanding of how to troubleshoot issues with OSPFv2 neighborships in Cisco IP networks. In this video; Dan Young demonstrates how to troubleshoot the issues of mismatched area IDs as well as ensuring you use correct commands and have devices in the right network areas.

70490
Tshoot 2.0 – Ospfv2 Neighborship: Mismatched Area Type Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot issues with OSPFv2 neighborship; including of issues caused by mismatched area types. With OSPFv2; areas have to match on a common broadcast domain or subnet. In this video; Dan Young demonstrates how to troubleshoot neighborship issues caused by mismatched areas in an example.

70498
Tshoot 2.0 – Ospfv2 Neighborship: Mismatched Mtu Dan Young

The TSHOOT 2.0 certification covers the tasks involved in troubleshooting MTU issues on a Cisco IP network. In this video; Dan Young demonstrates the role of MTU for OSPF neighborship and explores the consequences of MTU modifications as well as mismatched MTUs.

70491
Tshoot 2.0 – Eigrp Routing Issue: Network Command Issues Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot EIGRP routing problems; including network command issues. The network command takes an IP address component and optionally a wildcard mask component; and should be verified if a network is not being advertised into the EIGRP autonomous system. In this video; Dan Young demonstrates how to identify and resolve network command issues.

70526
Switch 2.0: Vtp Operation Dan Young

In SWITCH 2.0; VLAN Trunking Protocol (VTP) is a synchronization protocol that allows you to perform several operations. In this video; Dan Young demonstrates how to use VTP to replicate a VLAN database.

67234
Switch 2.0: Vtp Versions Dan Young

VLAN Trunking Protocol (VTP) in SWITCH 2.0 has three versions – version 1; 2; and 3. For VTP to work; you must ensure that all switches are running the same version in the same switch block. In this video; Dan Young discusses the differences between these three versions; focusing on their benefits and functions.

67235
Tshoot 2.0 – Acl: Configuration Guidelines Raymond Lacoste

The TSHOOT 2.0 certification covers the general guidelines for troubleshooting access control lists (ACLs); especially the standard and extended filtering options. In this video; Raymond Lacoste discusses the troubleshooting process and the filtering processes involved with ACLs.

70434
Tshoot 2.0 – Address Assignment Issues: Dhcpv4 I Raymond Lacoste

The TSHOOT 2.0 examination assesses your understanding of how to identify issues involved with DHCPv4 addressing; such as identifying why IPv4 traffic cannot be sent or received from devices connected via DHCP. In this video; Raymond Lacoste demonstrates how to troubleshoot potential DHCPv4 connectivity issues.

70337
Tshoot 2.0 – Address Assignment Issues: Dhcpv4 Ii Raymond Lacoste

When preparing for the TSHOOT 2.0 examination; you should know how to troubleshoot issues involved with DHCPv4 addressing; such as how to use the ip helper-address command and troubleshoot why messages are not relayed to the DHCP server. In this video; Raymond Lacoste demonstrates how to troubleshoot DHCPv4 connectivity with TSHOOT 2.0.

70338
Tshoot 2.0 – Address Assignment Issues: Slaac (ipv6) Raymond Lacoste

When preparing for the TSHOOT 2.0 examination; you should know how to resolve address assignment issues for Stateless Auto Configuration (SLAAC). In this video; Raymond Lacoste demonstrates how to troubleshoot SLAAC.

70340
Tshoot 2.0 – Address Assignment Issues: Stateful Dhcpv6 Raymond Lacoste

In preparing for the TSHOOT 2.0 certification; you should be able to diagnose and resolve stateful DHCPv6 address assignment issues. In this service; clients do not generate their own global IPv6 unicast address and instead receive all information from the DHCPv6 servers. In this video; Raymond Lacoste discusses the possible issues and how they may be resolved.

70342
Tshoot 2.0 – Address Assignment Issues: Stateless Dhcpv6 Raymond Lacoste

The TSHOOT 2.0 certification covers how to diagnose and resolve address assignment issues; including those associated with the stateless DHCPv6 service. In this service; clients generate their own global IPv6 unicast address and receive other information from DHCPv6 servers. In this video; Raymond Lacoste discusses the possible issues and how they can be resolved.

70341
Tshoot 2.0 – Address Assignment Issues: Static Ipv4 Raymond Lacoste

When preparing for the TSHOOT 2.0 examination; you should know how to identify some of the issues involved with static IPv4 addressing and troubleshoot an inappropriate address that is statically configured on the default gateway. In this video; Raymond Lacoste demonstrates how to troubleshoot address assignment issues for static IPv4.

70336
Tshoot 2.0 – Address Assignment Issues: Static Ipv6 Raymond Lacoste

The TSHOOT 2.0 certification covers static IPv6 addresses; their deployment; as well as how to remove incorrect addresses. In this video; Raymond Lacoste demonstrates how to assign and correct static IPv6 addresses.

70339
Tshoot 2.0 – Case Study: Troubleshooting Approaches Kevin Wallace

When preparing for the TSHOOT 2.0 examination; you need apply troubleshooting in order to determine the root of the problem and how it can be fixed. In this video; Kevin Wallace demonstrates how to locate the root of a problem through the use of a case study.

70382
Tshoot 2.0 – Case Study: Troubleshooting Procedures Kevin Wallace

The TSHOOT 2.0 examination covers the procedures you need to follow during troubleshooting in order to fix network related errors. In this video; Kevin Wallace demonstrates how to implement troubleshooting procedures through the use of a case study.

70385
Tshoot 2.0 – Eigrp Neighborship: Acl Issue And Timer Issues Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot problems with EIGRP neighborship; including Access Control List (ACL) and timer issues. An ACL preventing to EIGRP communication will prevent neighborships from forming; while timer mismatch causes flapping EIGRP neighborship. In this video; Dan Young demonstrates how to identify and resolve these issues.

70524
Tshoot 2.0 – Eigrp Neighborship: Authentication Issue Dan Young

The TSHOOT 2.0 certification assesses your ability to troubleshoot problems with EIGRP neighborship where there are authentication issues. There are a number of ways in which failed authentication can prevent EIGRP neighborship; including mismatched key ID or key string; no key chain specified; and erroneous time sensitivity. In this video; Dan Young demonstrates how to identify and resolve authentication issues.

70523
Tshoot 2.0 – Eigrp Neighborship: Incorrect Network Statements Dan Young

The TSHOOT 2.0 certification assesses your ability to troubleshoot issues with EIGRP neighborship; including incorrect network statements. The network command enables EIGRP for interfaces; and includes support for the wildcard mask. In this video; Dan Young demonstrates how to identify and resolve issues where EIGRP is not running on an interface due to an incorrect network statement.

70519
Tshoot 2.0 – Eigrp Neighborship: Interface Is Down Dan Young

In preparing for the TSHOOT 2.0 certification; you should be aware of how to deal with EIGRP errors caused by interfaces not operating. In this video; Dan Young demonstrates how to troubleshoot EIGRP neighborship when the interfaces connecting to the routers are down.

70517
Tshoot 2.0 – Eigrp Neighborship: Metric Weights Dan Young

When preparing for the TSHOOT 2.0 certification; you should be able to troubleshoot issues with EIGRP neighborship; including issues with metric weights. The feasible distance calculation with EIGRP can be modified by changing the weighting of the bandwidth; delay; reliability; load; and MTU metrics. In this video; Dan Young demonstrates how to identify and resolve metric weight issues.

70520
Tshoot 2.0 – Eigrp Neighborship: Mismatched As Dan Young

The TSHOOT 2.0 certification covers how to troubleshoot issues with EIGRP neighborship; including mismatched autonomous system (AS) number. The AS number is one of the most significant values that must match between two EIGRP devices; and is communicated in the hello protocol. In this video; Dan Young demonstrates how to identify and resolve issues with mismatched AS numbers.

70518
Tshoot 2.0 – Eigrp Neighborship: Passive Interface Dan Young

The TSHOOT 2.0 covers how to troubleshoot EIGRP neighborship issues with the passive-interface command. If the passive-interface command is enabled; the routing protocol is silenced and hellos will not be exchanged between routers. In this video; Dan Young demonstrates how to identify and resolve this issue.

70521
Tshoot 2.0 – Eigrp Routing Issue: Better Routing Source Dan Young

The TSHOOT 2.0 certification assesses your ability to troubleshoot EIGRP routing issues; including where there is a better routing source. EIGRP has two administrative distances – 170 for external routes and 90 for internal. Issues may arise with static or dynamic routes have lower administrative distances. In this video; Dan Young demonstrates how to identify and resolve these issues.

70527
Switch 2.0: Vacl Operation Dan Young

In SWITCH 2.0; VLAN Access Control Lists (VACLs) allow you to filter traffic within a VLAN by disallowing a specific protocol to communicate inside of a VLAN. In this video; Dan Young discusses the features and functions of two types of VACLs – IP ACLs and MAC ACLs.

67393
Switch 2.0: Verifying And Modifying Stp Timers Raymond Lacoste

Spanning Tree Protocol (STP) for SWITCH 2.0 relies heavily on the use of timers. Each timer has their own default settings and you can modify the hello time; the max age time; and the forwarding delay time. In this video; Raymond Lacoste demonstrates how STP timers can be verified and modified.

67292
Switch 2.0: Verifying Dhcp Raymond Lacoste

SWITCH 2.0 allows you to verify the configuration settings of Dynamic Host Configuration Protocol (DHCP). For instance; you can review settings; such as the domain name; default router; and DNS server using commands. In this video; Raymond Lacoste demonstrates the commands to verify DCHP configuration settings.

67252
Switch 2.0: Verifying Mstp Raymond Lacoste

SWITCH 2.0 allows you to design a Multiple Spanning Tree (MST) configuration that allows you to configure a separate spanning tree for each VLAN on the network and verify the setup. In this video; Raymond Lacoste demonstrates how to verify an MST configuration using a command.

67334
Switch 2.0: Verifying Port Security Dan Young

When using SWITCH 2.0; you need to have a good understanding of port security configurations and how to verify these settings. In this video; Dan Young discusses what to consider when verifying port security on a network with SWITCH 2.0.

67444
Switch 2.0: Verifying Snmp Version 3 Configuration Dan Young

In Simple Network Management Protocol version 3 (SNMPv3) for SWITCH 2.0; there are a number of ways to verify the SNMP configuration settings. The show snmp command shows basic SNMP information; and there are also show commands for views; groups; and users. In this video; Dan Young discusses the various methods for verifying SNMPv3 configuration.

67377
Switch 2.0: Verifying Vlans Dan Young

SWITCH 2.0 allows you to manage switches by creating VLANs and deploying them to specific ports. In this video; Dan Young demonstrates how to verify the VLANs which have been created by using commands to access information about the status of the VLANs; which ports they are deployed to and the nature of these ports.

67221
Switch 2.0: Viewing The Cam Table Raymond Lacoste

In SWITCH 2.0; the Content Addressable Memory (CAM) table contains vital information about switches and particularly MAC addresses. In this video; Raymond Lacoste demonstrates how to examine the information in the CAM table; how to view only dynamic entries; and how to modify the aging time for dynamic MAC entries.

67202
Switch 2.0: Vlan Hopping Mitigation Dan Young

In SWITCH 2.0; resources on virtual LANs (VLANs) can become vulnerable to hopping attacks such as double tagging in which event an attacker tags packets twice and uses this to bypass routers. In this video; Dan Young demonstrates how to mitigate against VLAN double tagging attacks using various configuration methods.

67392
Switch 2.0: Vlan Overview Dan Young

SWITCH 2.0 allows you to create multiple Virtual Local Area Networks (VLANs) to deal with the restrictions of Local Area Networks (LANs). VLANS are flexible and can be used in many different ways; such as private VLANs; voice VLANs; and bridging wireless. In this video; Dan Young discusses the characteristics; uses; and benefits of VLANs.

67218
Switch 2.0: Vlan Trunking Protocol Overview Dan Young

SWITCH 2.0 provides support for VLAN Trunking Protocol (VTP) that allows you to make changes to a VLAN at one device; and propagate those changes to the remaining switches in a domain. In this video; Dan Young demonstrates how to use VTP to propagate a change in a domain.

67232
Switch 2.0: Voice Vlan Configuration Dan Young

SWITCH 2.0 allows you to configure a Voice VLAN – a VLAN that’s propagated from an Access layer switch to an IP phone; where the IP phone acts as a minimalistic switch so that a computer can connect to it. In this video; Dan Young provides demonstrates how to configure a Voice VLAN to connect a computer to an IP phone.

67230
Switch 2.0: Voice Vlans Dan Young

In SWITCH 2.0; you can configure a Voice VLAN which is a VLAN that is propagated across from an Access layer switch to an IP phone. The IP phone acts as a minimalistic switch that enables a computer to connect to it. In this video; Dan Young discusses the function of Voice VLAN and its advantages.

67228
Switch 2.0: Vrrp Authentication Raymond Lacoste

In this video; Raymond Lacoste discusses SWITCH 2.0 VRRP authentication.

67417
Switch 2.0: Vrrp Configuration Raymond Lacoste

Virtual Router Redundancy Protocol (VRRP) in SWITCH 2.0 includes one Master device and several backup devices. When configuring VRRP; the virtual IP address; priorities; and timers can be defined and modified. In this video; Raymond Lacoste demonstrates VRRP configuration.

67416
Switch 2.0: Vrrp Object Tracking Raymond Lacoste

In SWITCH 2.0; VRRP does not have a native interface tracking mechanism; unlike Hot Standby Router Protocol (HSRP). However it can track objects such as interfaces; IP routes; and IP SLAs. In this video; Raymond Lacoste demonstrates object tracking for VRRP.

67418
Switch 2.0: Vtp Configuration Dan Young

VLAN Trunking Protocol (VTP) in SWITCH 2.0 has several default settings; such as the VTP domain name; VTP mode; VTP password; VTP version; and configuration revision number; that you need to know before you can start to implement it. In this video; Dan Young demonstrates how to use the show vtp status command to view default VTP configurations.

67236
Switch 2.0: Vtp Configuration Recommendation Dan Young

When using VLAN Trunk Protocol (VTP) in SWITCH 2.0; there are a number of recommended configuration settings. Current industry recommendations suggest that VTP should be used in transparent mode; which effectively turns the protocol off so that processes are carried out manually. In this video; Dan Young discusses the recommended configuration settings for VTP.

67243
Switch 2.0: Vtp Modes Dan Young

In SWITCH 2.0; you can use VLAN Trunking Protocol (VTP) to propagate the changes you’ve made to a VLAN at one device to the remaining switches in a domain. In this video; Dan Young provides discusses the three modes of operation supported by VTP – client; server; and transparent.

67233
Switch 2.0: Vacl Introduction Dan Young

In SWITCH 2.0; virtual LAN (VLAN) Access Control Lists (VACLs) allow you to filter traffic within a VLAN by disallowing a specific protocol to communicate inside of a VLAN. VACLs are configured through VLAN access maps. In this video; Dan Young discusses the features and functions of VACLs and compares them to port ACLs (PACLs) and router ACLs (RACLs).

67212
Switch 2.0: The Hardware Clock Dan Young

In SWITCH 2.0; some equipment contains a hardware clock. You can set this hardware clock to match the software clock. In this video; Dan Young demonstrate how to configure the hardware clock.

67360
Switch 2.0: The Loopguard Feature Raymond Lacoste

Spanning Tree Protocol (STP) in SWITCH 2.0 allows you to configure loop-free topologies on networks. STP supports the LoopGuard feature; which serves as a stability feature. In this video; Raymond Lacoste discusses the LoopGuard feature and demonstrates how it should be configured in a topology.

67319
Switch 2.0: The Need For Poe Dan Young

In SWITCH 2.0; Power over Ethernet (PoE) serves a number of functions; such as allowing the supply of power over the wires in unshielded twisted pair cabling and supporting remote management. In this video; Dan Young discusses some of the features of PoE and the advantages of using it.

67211
Switch 2.0: The Remote Span Feature Dan Young

SWITCH 2.0 contains the Switched Port Analyzer; or SPAN; feature that enables you to monitor and analyze network traffic. Remote SPAN; or RSPAN; is an extension of SPAN; and enables you to monitor traffic from sources that are distributed over multiple switches. In this video; Dan Young provides an overview of RSPAN.

67388
Switch 2.0: The Root Guard Feature Raymond Lacoste

In this video; Raymond Lacoste provides an overview and demonstration of the Cisco Root Guard feature in SWITCH 2.0.

67316
Switch 2.0: The Stp Root Bridge Raymond Lacoste

In this video; Raymond Lacoste discusses STP root bridge in SWITCH 2.0.

67278
Switch 2.0: The Switched Port Analyzer Dan Young

In SWITCH 2.0; you can use a Switched Port Analyzer (SPAN) to select and send particular network traffic segments for analysis. In this video; Dan Young demonstrates how to apply port mirroring by using the SPAN to help monitor network performance.

67386
Switch 2.0: The Virtual Switching System Dan Young

SWITCH 2.0 supports a technology called Virtual Switching System (VSS) which allows you to combine two physical switches; pair them together via a virtual switch link; and then manage them as a single chassis. In this video; Dan Young demonstrates VSS and how it helps augment connectivity.

67395
Switch 2.0: Topology Changes In Stp I Raymond Lacoste

In this video; Raymond Lacoste discusses topology changes in SWITCH 2.0 Spanning Tree Protocol (STP).

67304
Switch 2.0: Topology Changes In Stp Ii Raymond Lacoste

In this video; Raymond Lacoste demonstrates SWITCH 2.0 Spanning Tree Protocol (STP) topology changes.

67305
Switch 2.0: Trunks Overview Dan Young

In SWITCH 2.0; you can tidy up the switched infrastructure by ensuring that all the VLANs are carried in one pipe. This is called a trunk. In this video; Dan Young demonstrates how to create a trunk to create a tidier network.

67222
Switch 2.0: Tuning Hsrp Timers Raymond Lacoste

In SWITCH 2.0; Hot Standby Router Protocol uses hello packets and hold times to check the status of participating routers within groups. In this video; Raymond Lacoste demonstrates the default settings for hello and hold times in HSRP; and discusses how they may be tuned.

67412
Switch 2.0: Tuning Pvst Root Bridges Raymond Lacoste

In this video; Raymond Lacoste discusses tuning PSVT root bridges in SWITCH 2.0.

67296
Switch 2.0: Types Of Cisco Switches Dan Young

In SWITCH 2.0; you can use Cisco switches to deliver performance and security. In this video; Dan Young demonstrates the different types of switches present and their functions.

67195
Switch 2.0: Udld Configuration Raymond Lacoste

In this video; Raymond Lacoste discusses and demonstrates UDLD configuration in SWITCH 2.0.

67322
Switch 2.0: Udld Overview Raymond Lacoste

SWITCH 2.0 provides support for Unidirectional Link Detection (UDLD); a protocol that allows you to determine the status of a particular link. UDLD can be used with copper or fiber links. In this video; Raymond Lacoste discusses UDLD and how it functions in a topology.

67321
Switch 2.0: Udld Recommended Practices Raymond Lacoste

In SWITCH 2.0; you can use the Unidirectional Link Detection (UDLD) protocol to determine the status of a particular link. You should follow various best practices when implementing UDLD. In this video; Raymond Lacoste discusses these recommended practices.

67324
Switch 2.0: Understanding The Layer 2 Link Between Distribution Layer Switches Raymond Lacoste

In SWITCH 2.0; it is essential to understand the Layer 2 link between distribution layer switches. Hot Standby Router Protocol (HSRP) and Spanning Tree Protocol (STP) have no way of communicating with each other; so mediation is required to ensure the functioning of the topology. In this video; Raymond Lacoste discusses the links between distribution layer switches.

67404
Switch 2.0: Vacl Configuration Example Dan Young

In SWITCH 2.0; you can configure VLAN Access Control Lists (VACLs) to filter traffic within a virtual LAN (VLAN) by disallowing a specific protocol to communicate inside of the VLAN. In this video; Dan Young demonstrates an example VACL configuration in SWITCH 2.0.

67333
Switch 2.0: Vacl Configuration Syntax Dan Young

SWITCH 2.0 allows you to use VLAN Access Control Lists (VACLs) to filter traffic within a virtual LAN (VLAN) by disallowing a specific protocol. In this video; Dan Young demonstrates how to configure a VACL by defining MAC and IP access control lists (ACLs); creating an access map; and applying the access map to a list of VLANs.

67238
Switch 2.0: Svi Configuration Example Dan Young

In SWITCH 2.0; you can configure multilayer switching using the Switch Virtual Interface (SVIs). In this video; Dan Young demonstrates the configuration steps: enable IP routing; configure an SVI for each VLAN; configure an IP address; enable SVI; and configure routing protocol.

67347
Switch 2.0: Switch Attack Categories Dan Young

In SWITCH 2.0; there are several categories of attacks on switches. These include MAC address-based attacks; VLAN attacks; spoofing attacks; and attacks on switch devices. In this video; Dan Young discusses these switch attack categories in greater detail.

67441
Switch 2.0: Switch Block Routing Example Dan Young

In SWITCH 2.0; you can get full routed connectivity inside an autonomous system. To do this; you need to use dynamic routing. In this video; Dan Young demonstrates how to implement dynamic routing and discusses its importance.

67354
Switch 2.0: Switch Block Stp Topology Analysis Raymond Lacoste

In this video; Raymond Lacoste discusses switch block STP topology analysis in SWITCH 2.0.

67283
Switch 2.0: Switch Configuration For Wireless Network Support Dan Young

In SWITCH 2.0; you can configure wireless networks to allow you to access network resources while away from a wired network. Wireless access points can be configured using two different switch configurations – autonomous access points and lightweight access points. In this video; Dan Young discusses configuring wireless network support.

67231
Switch 2.0: Switch Routed Ports Overview Dan Young

In SWITCH 2.0; you need to implement multilayer switches and routed interfaces to properly deploy a multilayer switch environment. In this video; Dan Young discusses why you need Layer 3 three links or routed interfaces in a topology.

67349
Switch 2.0: Switch Security Issues Dan Young

In SWITCH 2.0; the open nature of the access layer exposes switches to security challenges; such as MAC address spoofing; overwhelming the MAC address table; or compromising the Spanning Tree Protocol. In this video; Dan Young discusses some of the security challenges that may arise with SWITCH 2.0 as well as how to address them.

67429
Switch 2.0: Switch Spoof Mitigation Dan Young

In SWITCH 2.0; networks may come under attack from rogue equipment of various kinds; including rogue switches. In this video; Dan Young discusses the mitigation techniques that can be employed to defend against switch spoofing in SWITCH 2.0.

67383
Switch 2.0: Switch Virtual Interfaces Overview Dan Young

In SWITCH 2.0; multilayer switching is similar to Router on a Stick configuration but brings router elements into the switch chassis. A Switch Virtual Interface (SVI) is used to configure routing between VLANs on a multilayer switch. In this video; Dan Young demonstrates the configuration process for multilayer switching.

67345
Switch 2.0: The 802.1q Native Vlan Dan Young

SWITCH 2.0 allows you to work with native VLANs. These are untagged VLANs on an 802.1q trunked switchport. In this video; Dan Young demonstrates how the native VLAN is created and used.

67223
Switch 2.0: The Access Layer In The Cisco Enterprise Campus Dan Young

SWITCH 2.0 allows you to use modular design to enable a component which is placed in service or taken out of service with little or no impact on the rest of the network. In this video; Dan Young demonstrates the importance of the access layer within dialogue design and its associated features.

67190
Switch 2.0: The Bpdufilter Feature Raymond Lacoste

In this video; Raymond Lacoste provides an overview and demonstration of the Cisco BPDUFilter feature in SWITCH 2.0.

67315
Switch 2.0: The Cisco Backbonefast Feature Raymond Lacoste

In this video; Raymond Lacoste provides an overview and demonstration of the Cisco BackboneFast feature in SWITCH 2.0.

67312
Switch 2.0: The Cisco Bpduguard Feature Raymond Lacoste

In this video; Raymond Lacoste provides an overview and demonstration of the Cisco BPDUGuard feature in SWITCH 2.0.

67314
Switch 2.0: The Cisco Portfast Feature Raymond Lacoste

In this video; Raymond Lacoste provides an overview and demonstration of the Cisco PortFast feature in SWITCH 2.0.

67313
Switch 2.0: The Cisco Power Calculator Dan Young

When using Power over Ethernet (PoE) for SWITCH 2.0; it’s important to be aware of the burden being placed on the infrastructure providing the power. The Cisco Power Calculator allows you to calculate the power being used. In this video; Dan Young demonstrates how to use the Cisco Power Calculator to calculate the power being used.

67217
Switch 2.0: The Cisco Stackwise Feature Dan Young

SWITCH 2.0 supports a technology that is generally referred to as stacking. Stacking allows you to take multiple physical switches and join them into a single; logical switching unit. Cisco’s specific solution for stacking is called StackWise. In this video; Dan Young demonstrates how to use StackWise using the show switch and show switch stack-ports commands.

67391
Switch 2.0: The Cisco Uplinkfast Feature Raymond Lacoste

In this video; Raymond Lacoste provides an overview and demonstration of the Cisco Uplink Fast feature in SWITCH 2.0.

67311
Switch 2.0: The Core Layer In The Cisco Enterprise Campus Dan Young

In SWITCH 2.0; the Core Layer is the backbone for campus connectivity; and it’s the aggregation point for the other layers and modules in the Cisco Enterprise Campus. In this video; Dan Young demonstrates how the Core Layer is created even though it is not always assumed.

67192
Switch 2.0: The Distribution Layer In The Cisco Enterprise Campus Dan Young

In SWITCH 2.0; you can use the distribution layer to aggregate traffic from all nodes and uplinks from the access layer. In this video; Dan Young demonstrates the function of the distribution layer and discusses how it provides policy-based connectivity.

67191
Switch 2.0: Span Terminology Dan Young

SWITCH 2.0 contains the Switched Port Analyzer (SPAN) feature that allows you to monitor and analyze network traffic. In this video; Dan Young provides an overview of some of the SPAN terminology and then demonstrates a SPAN example.

67387
Switch 2.0: Spanning Tree Operation Raymond Lacoste

In this video; Raymond Lacoste discusses Spanning Tree Protocol (STP) operation in SWITCH 2.0.

67277
Switch 2.0: Spanning Tree Path Cost Raymond Lacoste

When determining Spanning Tree Protocol (STP) topology in SWITCH 2.0; it is important to determine the cost of links. IEEE standards define link speeds of 10 Gpbs with a cost of 2; 1 Gbps with a cost of 4; 100 Mbps a cost of 19; and 10 Mbps a cost of 100. In this video; Raymond Lacoste discusses the cost system as it applies to STP topology.

67279
Switch 2.0: Storm Control Raymond Lacoste

The storm control feature in SWITCH 2.0 allows you to deal with network traffic storms. In this video; Raymond Lacoste discusses the storm control feature and how to configure and monitor network traffic thresholds in SWITCH 2.0.

67447
Switch 2.0: Storm Control Example Raymond Lacoste

When using SWITCH 2.0; you should have a good understanding of how to deal with network traffic storms. In this video; Raymond Lacoste demonstrates how to configure storm control features using commands and the actions to take once a storm has been dealt with in SWITCH 2.0.

67449
Switch 2.0: Stp In A Parallel Link Topology Raymond Lacoste

In this video; Raymond Lacoste discusses Spanning Tree Protocol (STP) in a parallel topology in SWITCH 2.0.

67284
Switch 2.0: Stp Instances With Mst Raymond Lacoste

Multiple Spanning Tree Protocol in SWITCH 2.0 allows you to configure a separate spanning tree for every VLAN on the network. When MSTP is enabled; every VLAN is placed into a special spanning tree instance. In this video; Raymond Lacoste discusses an example MST instances and the VLANs in each instance.

67328
Switch 2.0: Stp Operation Practice Raymond Lacoste

During the Spanning Tree Protocol (STP) operation in SWITCH 2.0; STP identifies the root bridge; the root ports; the designated ports; and finally determines which ports are blocked within that topology. In this video; Raymond Lacoste demonstrates the operations of the STP process in an example.

67285
Switch 2.0: Stp Overview Raymond Lacoste

In this video; Raymond Lacoste provides an overview of Spanning Tree Protocol (STP) in SWITCH 2.0.

67275
Switch 2.0: Stp Path Manipulation Raymond Lacoste

In this video; Raymond Lacoste provides an overview of STP path manipulation in SWITCH 2.0.

67298
Switch 2.0: Stp Port States Raymond Lacoste

In Spanning Tree Protocol (STP) for SWITCH 2.0; there are five different states that ports may be in when participating in the STP process. These are the blocking state; listening state; learning state; forwarding state; and discarded state. In this video; Raymond Lacoste discusses each of these five port states.

67289
Switch 2.0: Stp Standards Raymond Lacoste

In this video; Raymond Lacoste discusses Spanning Tree Protocol (STP) in SWITCH 2.0.

67276
Switch 2.0: Stp Timers Raymond Lacoste

Spanning Tree Protocol (STP) for SWITCH 2.0 relies heavily on the use of timers; such as the hello and max age timers; and forwarding delay. In this video; Raymond Lacoste discusses the use of timers in STP.

67290
Switch 2.0: Stp Topology Operation I Raymond Lacoste

There are a number of processes that take place during Spanning Tree Protocol (STP) operation in SWITCH 2.0. First; STP identifies the root bridge; then the root ports; then designated ports; and finally determines which ports are blocked within that topology. In this video; Raymond Lacoste discusses the first of these steps; and how the root bridge is identified.

67280
Switch 2.0: Stp Topology Operation Ii Raymond Lacoste

In this video; Raymond Lacoste provides an overview of STP topology operation in SWITCH 2.0.

67281
Switch 2.0: Stp Topology Operation Iii Raymond Lacoste

In this video; Raymond Lacoste discusses STP topology operation in SWITCH 2.0.

67282
Switch 2.0: Supervisor Redundancy Dan Young

SWITCH 2.0 Cisco Catalyst supervisor engines function as the heart of modular switch platforms. Cisco includes two supervisor switches within each engine that enable stateful information to cross between two. In this video; Dan Young discusses the supervisor switches and the purpose of supervisor redundancy.

67394
Switch 2.0: Svi Autostate Exclude Dan Young

In SWITCH 2.0; a Switch Virtual Interface (SVI) is used to configure routing between VLANs on a multilayer switch. Ports must be excluded from a line-state up-and-down calculation as they will still advertise reachability if connected to a sniffer; even if VLAN connections have dropped. In this video; Dan Young demonstrates how to use SVI autostate exclude for this.

67348
Switch 2.0: Svi Configuration Dan Young

When configuring multilayer switching for SWITCH 2.0; you need to configure switch virtual interfaces (SVIs) in these steps: enable IP routing; configure an SVI for each VLAN; configure an IP address; enable the SVI; and configure the routing protocol. In this video; Dan Young each of the steps of configuring SVIs for multilayer switching.

67346
Switch 2.0: Svi Configuration Checklist Dan Young

In SWITCH 2.0; you can implement multilayer switches and in order to do so; you need to ensure all the essential tools are present. In this video; Dan Young demonstrates the essential tools required and discusses their importance.

67351
Switch 2.0: Recovery From Root-inconsistent State Raymond Lacoste

In this video; Raymond Lacoste discusses recovery from root-inconsistent state in SWITCH 2.0.

67317
Switch 2.0: Remote Span Configuration Dan Young

SWITCH 2.0 contains the Switched Port Analyzer (SPAN) feature that allows you to monitor and analyze network traffic. Remote SPAN; or RSPAN; is an extension of SPAN and allows you to monitor traffic from sources that are distributed over multiple switches. In this video; Dan Young demonstrates how to perform an RSPAN configuration.

67389
Switch 2.0: Rogue Devices In The Campus Dan Young

In SWITCH 2.0; you should be aware of the potential for rogue devices in the campus environment. A rogue device is a device that is unexpected; unwanted and not part of the authorized infrastructure. They may be switches; access points or hubs. In this video; Dan Young discusses some common rogue devices and the threats they pose.

67440
Switch 2.0: Routed Vs. Switched Campus Architecture Dan Young

In SWITCH 2.0; choosing between Layer 2 and Layer 3 as the structure of the campus environment at the access layer is a critical decision. Layer 3 switching brings more complexity; with more termination points between subnets and the elimination of the Spanning Tree Protocol. In this video; Dan Young demonstrates the differences between Layer 2 and Layer 3 switching.

67196
Switch 2.0: Router On A Stick Configuration Dan Young

To configure Router on a Stick in SWITCH 2.0; you need to configure a switch and a router. The switch needs to be configured with the VLANs. In this video; Dan Young demonstrates router on a stick configuration.

67343
Switch 2.0: Router On A Stick Operation Dan Young

In SWITCH 2.0; one of the key features of inter-VLAN routing; or router on a stick configuration; is the construction of connected routes on sub-interfaces. In this video; Dan Young discusses traffic flow in inter-VLAN routing.

67342
Switch 2.0: Rstp Link Types Raymond Lacoste

SWITCH 2.0 provides support for the Rapid Spanning Tree Protocol (RSTP) which categorizes various links within a spanning-tree topology. In this video; Raymond Lacoste discusses several RSTP link types and examines their characteristics and functions in a spanning-tree topology.

67307
Switch 2.0: Rstp Port Roles Raymond Lacoste

In this video; Raymond Lacoste demonstrates comparing RSTP and STP port states.

67302
Switch 2.0: Rstp Proposal-agreement Sequence I Raymond Lacoste

In this video; Raymond Lacoste provides an overview of the RSTP proposal-agreement sequence in SWITCH 2.0.

67308
Switch 2.0: Rstp Proposal-agreement Sequence Ii Raymond Lacoste

In this video; Raymond Lacoste demonstrates the RSTP proposal-agreement sequence in SWITCH 2.0.

67309
Switch 2.0: Rstp Topology Changes Raymond Lacoste

In this video; Raymond Lacoste discusses Rapid Spanning Tree Protocol (RSTP) topology changes in SWITCH 2.0.

67306
Switch 2.0: Scaling The Campus Network With The Core Layer Dan Young

In SWITCH 2.0; you can use the core layer to assist in scalability during future growth. In this video; Dan Young discusses the reasons why the core layer is fundamental for scaling the Campus network.

67194
Switch 2.0: Sdm Templates Raymond Lacoste

In SWITCH 2.0; you can use SDM templates to complete tasks. These SDM templates can be altered; if required. In this video; Raymond Lacoste demonstrates how to change the layers of a template to deal with the use of IPv6.

67206
Switch 2.0: Securing Ntp Dan Young

In Network Time Protocol (NTP) version 3 for SWITCH 2.0; the security settings are robust. One of the key security requirements is validation of accurate time; as this is used in many authentication processes. In this video; Dan Young demonstrates how to use authentication keys to ensure the accuracy of time for NTP security.

67366
Switch 2.0: Sla Example Configuration Dan Young

In SWITCH 2.0; you can configure the jitter operation when using the User Datagram Protocol (UDP) to measure network performance statistics such as round-trip delays; one-way delays; one-way jitters; and one-way packet losses. In this video; Dan Young demonstrates how to implement UDP jitter by means of an example.

67385
Switch 2.0: Snmp Components Dan Young

In SWITCH 2.0; Simple Network Management Protocol (SNMP) is a management protocol that runs on UDP/IP and supports message exchange. SNMP comprises a manager; managed devices; agents; and Management Information Bases (MIBs). In this video; Dan Young discusses the various components of SNMP; and how they interact with each other.

67372
Switch 2.0: Snmp Recommendations Dan Young

When using Simple Network Management Protocol (SNMP) for SWITCH 2.0; there are several ways of optimizing the security configuration; including restricting access to read-only; constraining devices that can communicate with an access list; and data encryption. In this video; Dan Young demonstrates these configuration settings.

67374
Switch 2.0: Snmp Version 3 Configuration Dan Young

In SWITCH 2.0; several Simple Network Management Protocol version 3 (SNMPv3) settings can be configured according to user preferences. These include access lists; groups; traps; and interface index persistence. In this video; Dan Young discusses these configuration settings in SNMPv3; and demonstrates the process.

67375
Switch 2.0: Snmp Versions Dan Young

In Simple Network Management Protocol (SNMP) for SWITCH 2.0; there are a number of basic communication types; as well as SNMP versions. In this video; Dan Young discusses the five SNMP communication types – Get Requests; Get Next Requests; Set Requests; Get Responses; and Traps.

67373
Switch 2.0: Sntp Dan Young

In SWITCH 2.0; there is a variant of Network Time Protocol (NTP) called Simple Network Time Protocol (SNTP); which uses a subset of NTP functionalities. SNTP configuration commands are very similar to those used with NTP. In this video; Dan Young discusses the features and uses of SNTP; as well as how to configure it.

67371
Switch 2.0: Private Vlan Introduction Raymond Lacoste

In SWITCH 2.0; you can use Private Virtual Local Area Networks (PVLANs) to connect the same server; while protecting traffic and without having to create separate subnets. Traffic is permitted between interfaces belonging to the same PVLAN but denied between different PVLANs. In this video; Raymond Lacoste discusses the features of PVLANs.

67415
Switch 2.0: Private Vlan Port Types I Raymond Lacoste

In SWITCH 2.0; you can use Private Virtual Local Area Networks (PVLANs) to allow devices to connect the same server; while protecting their traffic and without having to create separate subnets. Primary PVLANs and secondary PVLANs must be defined before being mapped using association mapping. In this video; Raymond Lacoste demonstrates the commands for configuring PVLANs.

67454
Switch 2.0: Private Vlan Port Types Ii Raymond Lacoste

In SWITCH 2.0; Private Virtual Local Area Networks (PVLANs) allow devices to connect the same server. Once primary and secondary VLANs are associated; ports must be configured. In this video; Raymond Lacoste demonstrates the commands used to configure ports in PVLANs.

67455
Switch 2.0: Private Vlan Verification Raymond Lacoste

Private Virtual Local Area Networks (PVLANs) allow you to configure devices to connect the same server in SWITCH 2.0. Primary PVLANs and secondary PVLANs must be defined before being mapped using association mapping. In this video; Raymond Lacoste demonstrates how to verify PVLAN configuration settings.

67457
Switch 2.0: Private Vlans Across Multiple Switches Raymond Lacoste

In SWITCH 2.0; Private Virtual Local Area Networks (PVLANs) can be spanned across multiple switches. When running end-to-end VLANs; using local VLANs with the Enterprise Campus Architecture is the recommended process; however; it can be implemented using PVLANs. In this video; Raymond Lacoste discusses how PVLANs can be spanned across multiple switches.

67458
Switch 2.0: Protected Port Feature Raymond Lacoste

In SWITCH 2.0; the protected port feature is used as an alternative to Private Virtual Local Area Networks (PVLANs) when the PVLAN feature is not available and is also known as PVLAN edge. Protected ports cannot communicate with protected ports on the same switch. In this video; Raymond Lacoste demonstrates how to configure protected ports.

67459
Switch 2.0: Pvlan Primary And Secondary Vlans Raymond Lacoste

Private Virtual Local Area Networks (PVLANs) in SWITCH 2.0 allow devices to connect the same server; while preventing communication and without having to create separate subnets. The primary VLAN comprises the VLAN and associated subnet; while secondary VLANs isolate hosts within the VLAN. In this video; Raymond Lacoste discusses primary and secondary VLANs with PVLANs.

67453
Switch 2.0: Pvst And The Extended System Id I Raymond Lacoste

SWITCH 2.0 allows you to maintain flexibility and control of a spanning-tree topology using Cisco’s proprietary version of Spanning Tree Protocol (STP) – Per VLAN Spanning Tree Plus. In this video; Raymond Lacoste discusses Per VLAN Spanning Tree Plus and how it provides you with a different instance of STP for every VLAN.

67293
Switch 2.0: Pvst And The Extended System Id Ii Raymond Lacoste

In SWITCH 2.0; you can ensure that Spanning Tree topologies remain flexible using the Per VLAN Spanning Tree Plus. In this video; Raymond Lacoste demonstrates how to use Per VLAN Spanning Tree Plus and bridge priorities to obtain the VLAN number.

67294
Switch 2.0: Radius And Tacacs+ Overview Dan Young

SWITCH 2.0 uses authentication; authorization; and accounting (AAA) protocols and these protocols can be applied to RADIUS and TACACS+ servers. In this video; Dan Young discusses AAA protocols; such as the User Datagram Protocol (UDP) and Transmission Control Protocol (TCP); in SWITCH 2.0.

67227
Switch 2.0: Ntpv4 For Ipv6 Dan Young

In SWITCH 2.0; Network Time Protocol version 4 (NTPv4) allows NTP to be used over an IPv6 network. NTPv4 can be configured for an IPv6 network either using a client-mode command; as a peer; or using link local addresses. In this video; Dan Young discusses this configuration and how it can be verified.

67370
Switch 2.0: Overwriting Vtp Configuration Dan Young

In SWITCH 2.0; you may need to overwrite VLAN Trunk Protocol (VTP) configuration; particularly with domain operation in VTP versions 1 and 2. In this video; Dan Young demonstrates how to overwrite VLAN Trunk Protocol (VTP) configuration to prevent a decommissioned switch that has been resurrected with a higher domain number from destroying the domain.

67239
Switch 2.0: Pagp And Lacp Modes I Raymond Lacoste

When using SWITCH 2.0; you should set up EtherChannel bundles to ensure efficient and secure operation. In this video; Raymond Lacoste demonstrates the options for EtherChannel bundle creation; focusing on the dynamic option for creation.

67265
Switch 2.0: Pagp And Lacp Modes Ii Raymond Lacoste

In SWITCH 2.0; you can form EtherChannel bundles by dynamically using protocols; or by manually entering the required commands. In this video; Raymond Lacoste demonstrates how to set up the links of the different modes of operation; assessing the challenges which may be encountered.

67266
Switch 2.0: Poe Components Dan Young

In SWITCH 2.0; switches can be classified as Power Sourcing Equipment (PSE) and power can be derived from them. In this video; Dan Young demonstrates the devices that may be powered by PSE.

67213
Switch 2.0: Poe Standards And Negotiation Dan Young

In SWITCH 2.0; Power over Ethernet (PoE) switches were initially a proprietary standard; however industry standards now exist. In this video; Dan Young discusses some of the components of PoE; focussing on the power standards relating to PoE that exist; as well as negotiation.

67214
Switch 2.0: Port Access Lists Dan Young

When using SWITCH 2.0; you should have a good understanding of Access Control Lists (ACLs). In this video; Dan Young discusses the various types of ACLs that can be implemented – focusing on the use of Port ACLs (PACLs) – by means of an example.

67446
Switch 2.0: Port Security Overview Dan Young

When using SWITCH 2.0; you should consider the threat of hackers potentially gaining access to a network via network ports. In this video; Dan Young demonstrates how to deal with hackers performing MAC flooding attacks when using SWITCH 2.0.

67442
Switch 2.0: Private Vlan Configuration Raymond Lacoste

In SWITCH 2.0; you can use Private Virtual Local Area Networks (PVLANs) to connect devices to the same server. In this way; you don’t have to create separate subnets. In this video; Raymond Lacoste demonstrates an example of PVLAN configuration on a topology where the objective is to use PVLANs to prevent communication between two file servers.

67456
Switch 2.0: Ntp Versions Dan Young

There are several available versions of Network Time Protocol (NTP) for SWITCH 2.0. Each has different features and functions. The currently used versions are NTP Version 3 and NTP Version 4. In this video; Dan Young discusses the features of NTP Versions 3 and 4; and the differences between them; including security features and broadcasting function.

67369
Switch 2.0: Layer 2 Switch Operation Raymond Lacoste

In SWITCH 2.0; the Content Addressable Memory (CAM) table contains valuable operational data; such as the port number learned by the MAC address and the VLANs that the ports are members of. In this video; Raymond Lacoste discusses the role that the CAM table plays in Layer 2 switch operation.

67197
Switch 2.0: Layer 3 Etherchannel Configuration Dan Young

In SWITCH 2.0; you can use Layer 3 EtherChannel configuration. In this video; Dan Young demonstrates how to configure Layer 3 port channels and uses the EtherChannel summary to verify the configuration.

67356
Switch 2.0: Lldp Introduction Dan Young

SWITCH 2.0 includes both the Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP). In this video; Dan Young demonstrates how to contract these two protocols; and explore their functions and their differences.

67208
Switch 2.0: Load Sharing With Hsrp Overview Raymond Lacoste

In SWITCH 2.0; load sharing with Spanning Tree Protocol (STP) can use Hot Standby Router Protocol (HSRP). Load sharing is the process of ensuring all potential links in the topology that can optimize traffic flow are use. In this video; Raymond Lacoste discusses the load sharing process when using HSRP.

67405
Switch 2.0: Loopguard Configuration Raymond Lacoste

In this video; Raymond Lacoste discusses and demonstrates LoopGuard configuration in SWITCH 2.0.

67320
Switch 2.0: Managing Time On Catalyst Switches Dan Young

SWITCH 2.0 allows you to manage the time on catalyst switches to ensure the timestamp is correct; especially for logging messages. In this video; Dan Young discusses the importance of ensuring that the date and time are correct on a catalyst switch.

67357
Switch 2.0: Manipulating Stp Cost And Port Id I Raymond Lacoste

In this video; Raymond Lacoste demonstrates manipulating STP cost and port ID’s in SWITCH 2.0.

67299
Switch 2.0: Manipulating Stp Cost And Port Id Ii Raymond Lacoste

In this video; Raymond Lacoste demonstrates manipulating STP cost and port ID’s in SWITCH 2.0.

67300
Switch 2.0: Manually Assigning Ip Addresses Through Dhcp Raymond Lacoste

When using Dynamic Host Configuration Protocol (DHCP) for SWITCH 2.0; you can assign a constant IP address to devices without statically defining them on an individual basis. A reservation can be made using DHCP so that a particular client ID will always be assigned a certain IP address. In this video; Raymond Lacoste demonstrates this process.

67253
Switch 2.0: Mst Protocol Migration Raymond Lacoste

In SWITCH 2.0; you can design a Multiple Spanning Tree (MST) configuration with separate spanning tree for each VLAN in the topology. When deploying this MST; there are various elements that you need to consider. In this video; Raymond Lacoste demonstrates MST protocol migration.

67338
Switch 2.0: Mst Recommended Practices Raymond Lacoste

When using SWITCH 2.0 to deploy a Multiple Spanning Tree (MST) configuration within a Layer 2 topology; there are several recommended practices to keep in mind. In this video; Raymond Lacoste discusses the how to deploy Multiple Spanning Tree Protocol within a Layer 2 topology.

67339
Switch 2.0: Mst Region Interaction Raymond Lacoste

In SWITCH 2.0; you can run Multiple Spanning Tree Protocol on switches that are connected to other switches that are not running Multiple Spanning Tree Protocol. You can also run Multiple Spanning Tree Protocol on multiple MST regions. In this video; Raymond Lacoste provides discusses how multiple MST regions work together to maintain a loop-free topology.

67329
Switch 2.0: Mst Regions Raymond Lacoste

In this video; Raymond Lacoste provides an overview of MST regions in SWITCH 2.0.

67327
Switch 2.0: Multiple Spanning Tree Protocol Overview Raymond Lacoste

Multiple Spanning Tree Protocol in SWITCH 2.0 configures separate Spanning Trees for each VLAN in a network where all paths; except one; are blocked within each tree. This allows you to further develop the use of your VLAN. In this video; Raymond Lacoste discusses Multiple Spanning Tree Protocol.

67326
Switch 2.0: Multiple Spanning Tree Protocol Vlan Mapping Raymond Lacoste

In this video; Raymond Lacoste introduces Spanning Tree Protocol VLAN mapping in SWITCH 2.0.

67330
Switch 2.0: Ntp Design Hierarchy Dan Young

In SWITCH 2.0; you can set up a tiered structure NTP which assists the distributed network with its Clock Time Synchronization protocol. In this video; Dan Young demonstrates how to configure an NTP with different tiers.

67365
Switch 2.0: Ntp Modes Dan Young

SWITCH 2.0 allows you to control the methods in which Network Time Protocol (NTP) is implemented. In this video; Dan Young demonstrates the different modes of NTP.

67363
Switch 2.0: Ntp Overview Dan Young

In SWITCH 2.0; you can use Network Time Protocol (NTP) to channel information. NTP is User Datagram Protocol (UDP) based. In this video; Dan Young discusses how to monitor network information using NTP and its ports.

67361
Switch 2.0: Ntp Source Address Dan Young

When using Network Time Protocol (NTP) for SWITCH 2.0; it’s useful to be able to control the source address for NTP communication. Routers with multiple interfaces will have many different IP addresses. In this video; Dan Young explains how to use the ntp source Loopback 0 command to choose an appropriate interface as a source address for NTP communication.

67368
Switch 2.0: Layer 2 Etherchannel Vs. Layer 3 Etherchannel Dan Young

EtherChannel technology in SWITCH 2.0 is flexible and can be used for channelized Layer 2 and Layer 3. You can use Layer 3 channels when you need additional bandwidth or additional links. In this video; Dan Young discusses the differences between Layer 2 EtherChannel and Layer 3 EtherChannel.

67355
Switch 2.0: Hsrp Priority And Preemption Reviewed Raymond Lacoste

In SWITCH 2.0; Hot Standby Router Protocol (HSRP) is Cisco’s proprietary First Hop Redundancy Protocol. With HSRP; the device with the highest priority becomes the active forwarder; and when preemption is enabled that device assumes the active role even when it is already filled. In this video; Raymond Lacoste discusses HSRP priority and preemption.

67400
Switch 2.0: Hsrp Verification Raymond Lacoste

SWITCH 2.0 allows you to verify the Hot Standby Router Protocol (HSRP) configuration to ensure that routers and multilayer switches are grouped together correctly. In this video; Raymond Lacoste demonstrates the ‘show standby brief’ and ‘show standby’ commands that can be used to verify HSRP configuration.

67401
Switch 2.0: Hsrp Versions Raymond Lacoste

In this video; Raymond Lacoste provides an overview of HSRP versions in SWITCH 2.0.

67413
Switch 2.0: Ibns And 802.1x Overview Dan Young

In SWITCH 2.0; you can perform Identity Based Networking; where you are able to lock down connectivity to a virtual LAN (VLAN) if a user does not possess valid credentials. You can take a user’s credentials and use them to validate against a RADIUS server. In this video; Dan Young discusses Identity Based Networking.

67248
Switch 2.0: Implementing Pvrst+ Raymond Lacoste

In this video; Raymond Lacoste discusses implementing PVRST+ in SWITCH 2.0.

67301
Switch 2.0: Inefficiencies With The Campus Switch Block Dan Young

SWITCH 2.0 allows you to monitor and analyze network traffic. The topology used to do this; however; is fundamentally flawed because everything is based off of a typical switch block. In this video; Dan Young discusses the inefficiencies with the campus switch block.

67390
Switch 2.0: Inter-vlan Routing Using An External Router Dan Young

In SWITCH 2.0; inter-VLAN routing; or Router on a Stick configuration; allows traffic between multiple VLANs to be managed through a single physical interface. This configuration is applicable to adaptive security appliances and when setting up routing between VLANs and the DMZ. In this video; Dan Young discusses inter-VLAN routing and the importance of sub-interfaces in inter-VLAN routing.

67341
Switch 2.0: Inter-vlan Routing Using An External Router: Caveats Dan Young

Using an external router to service the routing between VLANs in SWITCH 2.0 has several benefits and disadvantages; depending on whether it’s for a home environment or enterprise network. In this video; Dan Young discusses some of the disadvantages of using this configuration.

67344
Switch 2.0: Introduction To Vrrp Raymond Lacoste

In SWITCH 2.0; Virtual Router Redundancy Protocol (VRRP) operates in a similar manner to Hot Standby Router Protocol (HSRP). In VRRP; there is one Master device and all other devices are Backup. The assigned virtual IP address may be a real IP address of one of the VRRP group members. In this video; Raymond Lacoste discusses VRRP operation and configuration.

67414
Switch 2.0: Ip Sla Introduction Dan Young

In SWITCH 2.0; you can use an IP service-level agreement; or SLA; which then exists between you and the service provider. SLAs help you to monitor performance and connectivity to ensure that your IP network is functioning optimally. In this video; Dan Young demonstrates the benefits and key features of using an IP service-level agreement with SWITCH 2.0.

67378
Switch 2.0: Ip Sla Source And Responder Dan Young

In SWITCH 2.0; you can configure an IP service level agreement (SLA) to allow the system to anticipate and respond to packet requests for data within a network. In this video; Dan Young demonstrates where a responder fits into an IP network and the ways in which it can be used with SWITCH 2.0.

67380
Switch 2.0: Ip Source Guard Overview Raymond Lacoste

In SWITCH 2.0; you can use IP source guard to protect against spoofed IP addresses by tracking IP address to port associations. IP source guard compares the source IP of inbound packets with the DHCP binding table and ensures they match. In this video; Raymond Lacoste discusses the features of IP source guard with SWITCH 2.0.

67362
Switch 2.0: Ipv6 Stateless Autoconfiguration Example Raymond Lacoste

In SWITCH 2.0 you can perform IPv6 stateless autoconfigiration on a PC. In this video; Raymond Lacoste demonstrates how to use stateless autoconfigration to configure IPv6 addresses; and deal with VLAN interfaces in an example.

67256
Switch 2.0: Ipv6 Stateless Autoconfiguration Operation Raymond Lacoste

SWITCH 2.0 allows you to perform Stateless Autoconfiguration with IPv6 addresses. In this video; Raymond Lacoste demonstrates the processes involved with performing Stateless autoconfiguration; from the creation of the unique link-local IPv6 address through to the Duplicate Address Detection process.

67255
Switch 2.0: Ipv6 Stateless Autoconfiguration Overview Raymond Lacoste

SWITCH 2.0 provides the option of Stateless Autoconfiguration as a method for IPv6 address deployment. In this video; Raymond Lacoste discusses how the Stateless Autoconfiguration feature creates a 64-bit interface ID with the 48-bit address within a LAN network.

67254
Switch 2.0: L2 Vs L3 Switch Forwarding Operation Raymond Lacoste

In SWITCH 2.0; several processes occur when traffic arrives on a Layer 2 switch port. In this video; Raymond Lacoste discusses these processes; including ingress and egress queues; Content Addressable Memory (CAM) and Ternary Content Addressable Memory (TCAM) tables; and Access Control Lists. He also discusses the differences between Layer 2 and multilayer switching.

67199
Switch 2.0: Layer 2 Etherchannel Configuration Raymond Lacoste

In SWITCH 2.0; you can use EtherChannel to configure interfaces on two catalyst switches. In this video; Raymond Lacoste demonstrates how to configure such Layer 2 interfaces.

67268
Switch 2.0: Layer 2 Etherchannel Configuration Guidelines Raymond Lacoste

SWITCH 2.0 allows you to identify the ports which will be utilized. All such ports support EtherChannel. In this video; Raymond Lacoste demonstrates the how these ports are configured.

67267
Switch 2.0: Layer 2 Etherchannel Example Raymond Lacoste

SWITCH 2.0 allows you to use EtherChannel to configure a Layer 2 switchport. This is formed by using both links for forwarding traffic. In this video; Raymond Lacoste demonstrates how to configure a Layer 2 interface.

67269
Switch 2.0: Layer 2 Etherchannel Verification Raymond Lacoste

In SWITCH 2.0; you can verify your Layer 2 EtherChannel configuration by using an interface command. In this video; Raymond Lacoste demonstrates the steps in the verification process.

67270
Switch 2.0: Frame Rewrite Raymond Lacoste

In SWITCH 2.0; a Layer 3 switch performs frame forwarding in the same way as a Layer 2 switch; but also has the ability to act as a router. In this video; Raymond Lacoste demonstrates the processes within a Layer 3 switch; focusing on how it performs routing.

67201
Switch 2.0: Glbp And Stp Interaction Raymond Lacoste

SWITCH 2.0 you can run the Gateway Load Balancing Protocol (GLBP) and Spanning Tree Protocol (STP) concurrently in a network. In this video; Raymond Lacoste demonstrates the impact of suboptimal traffic flows in VLANs and subnets.

67425
Switch 2.0: Glbp Authentication Raymond Lacoste

When using the Gateway Load Balancing Protocol (GLBP) with SWITCH 2.0; you should consider the importance of authentication. In this video; Raymond Lacoste demonstrate the implementation of MD5 authentication and the MD5 setup process; and discusses how to deal with potential issues that may arise.

67424
Switch 2.0: Glbp Benefits Raymond Lacoste

In SWITCH 2.0; you should consider the potential benefits associated with using the Gateway Load Balancing Protocol (GLBP). In this video; Raymond Lacoste demonstrates the various uses of GLBP and explains the function of Active Virtual Gateways (AVGs); Active Virtual Forwarders (AVFs); and IP addresses.

67420
Switch 2.0: Glbp Operation I Raymond Lacoste

SWITCH 2.0 allows you to employ the Gateway Load Balancing Protocol (GLBP) to improve the efficiency of a network. In this video; Raymond Lacoste demonstrates implementing GLBP; explains the round-robin default load-balancing process; and discusses how weighting is used.

67423
Switch 2.0: Glbp Operation Ii Raymond Lacoste

When using SWITCH 2.0; you should know how to deal with a gateway load balancing failure. In this video; Raymond Lacoste demonstrates how Active Virtual Forwarders (AVFs) respond to a broken link.

67451
Switch 2.0: Glbp Overview Raymond Lacoste

When using SWITCH 2.0; you need to have an understanding of what the Gateway Load Balancing Protocol (GLBP) is. In this video; Raymond Lacoste uses SWITCH 2.0 to walk through the characteristics of GLBP by comparing it with Hot Standby Router Protocol (HSRP) load sharing.

67200
Switch 2.0: Glbp States Raymond Lacoste

When using SWITCH 2.0; you should understand the different states of active virtual gateways (AVGs) and active virtual forwarders (AVFs). In this video; Raymond Lacoste uses SWITCH 2.0 to demonstrate the various states of each and gives an in-depth view of the respective functions of AVGs and AVFs.

67419
Switch 2.0: Glbp Verification Raymond Lacoste

In SWITCH 2.0; you should be familiar with the show GLBP command; and how to interpret the output information that this command provides. In this video; Raymond Lacoste demonstrates how to use the show GLBP command and interpret information regarding active virtual gateways (AVGs); and active virtual forwarders (AVFs).

67422
Switch 2.0: Glbp Vs. Hsrp Raymond Lacoste

When using SWITCH 2.0; you should have a good understanding of how the characteristics of the Gateway Load Balancing Protocol (GLBP) compare to that of the Hot Standby Router Protocol (HSRP). In this video; Raymond Lacoste uses SWITCH 2.0 to demonstrate some of the differences between HSRP and GLBP.

67188
Switch 2.0: Hierarchical Network Design Dan Young

In SWITCH 2.0; you can use hierarchical network design to break the complex problem of network design into smaller; more manageable parts. In this video; Dan Young demonstrates how to apply a dialogue design pre-set.

67187
Switch 2.0: Hsrp And Object Tracking Example Raymond Lacoste

SWITCH 2.0 allows object tracking in Hot Standby Router Protocol (HSRP) to monitor specific objects; rather than links. Object tracking configuration involves defining the instance to be tracked; attaching it to a tracking object; and finally attaching this to HSRP configuration. In this video; Raymond Lacoste demonstrates object tracking configuration.

67410
Switch 2.0: Hsrp Authentication Raymond Lacoste

In SWITCH; 2.0; routers with Hot Standby Router Protocol (HSRP) grouped together to share an interface. Authentication is a crucial consideration with HSRP to control which devices are part of the group; and this may be plain text authentication or MD5 authentication. In this video; Raymond Lacoste demonstrates HSRP authentication.

67411
Switch 2.0: Hsrp Configuration Demonstration Raymond Lacoste

In SWITCH 2.0; you can configure Hot Standby Router Protocol (HSRP). With HSRP; routers and multilayer switches are grouped together to share an interface that is part of the same local area network. In this video; Raymond Lacoste demonstrates the HSRP configuration process.

67398
Switch 2.0: Hsrp Configuration Introduction Raymond Lacoste

In SWITCH 2.0; Hot Standby Router Protocol (HSRP) is Cisco’s proprietary First Hop Redundancy Protocol. With HSRP; routers and multilayer switches are grouped together to share an interface that is part of the same local area network. In this video; Raymond Lacoste discusses the features of HSRP and gives an introduction to its configuration.

67397
Switch 2.0: Hsrp Interface Tracking Overview I Raymond Lacoste

In SWITCH 2.0; the interface tracking in Hot Standby Router Protocol (HSRP) shows routers to monitor the status of an interface and to decrement local priority if a router fails so that another router can become the active forwarder. In this video; Raymond Lacoste discusses interface tracking with HSRP.

67407
Switch 2.0: Hsrp Interface Tracking Overview Ii Raymond Lacoste

SWITCH 2.0 uses interface tracking in Hot Standby Router Protocol (HSRP) to teach routers to decrement local priority if a link fails so that another router can become the active forwarder. Interface tracking is a built-in HSRP feature. In this video; Raymond Lacoste demonstrates interface tracking configuration.

67408
Switch 2.0: Hsrp Operation Examined Raymond Lacoste

In SWITCH 2.0; Hot Standby Router Protocol (HSRP) allows the device with the highest priority to become the active forwarder; and when preemption is enabled that device assumes the active role even when it is already filled. In this video; Raymond Lacoste demonstrates the processes involved in HSRP operation.

67403
Switch 2.0: Hsrp Priority And Preemption Raymond Lacoste

In SWITCH 2.0; Hot Standby Router Protocol (HSRP) adds routers and multilayer switches in a group and only one router in the group will be the active forwarder. This is determined by the priority of each of the routers. In this video; Raymond Lacoste discusses HSRP priority and preemption.

67399
Switch 2.0: First Hop Redundancy Operation With Hsrp Raymond Lacoste

Hot Standby Router Protocol (HSRP) in SWITCH 2.0 ensures that device with the highest priority becomes the active forwarder; and when pre-emption is enabled that device assumes the active role even when it is already filled. In this video; Raymond Lacoste discusses how the client is integrated within the overall HSRP process.

67402
Switch 2.0: Dhcpv6 Overview I Raymond Lacoste

SWITCH 2.0 allows you to use DHCP for address configuration. To do this; you need to understand how the client operates when it receives an IPv6 address from a DHCPv6 server. In this video; Raymond Lacoste demonstrates how to configure the client to use DHCP.

67257
Switch 2.0: Dhcpv6 Overview Ii Raymond Lacoste

In SWITCH 2.0; you can use DHCPv6 configurations instead of Stateless Autoconfiguration. In this video; Raymond Lacoste discusses what occurs after a client has been configured to use the DHCP process and demonstrates the steps to solicit and advertise the message.

67258
Switch 2.0: Dhcpv6 Relay Agent Raymond Lacoste

SWITCH 2.0 allows you to create DHCPv6 relay agents to send solicit messages outside of a local area network (LAN). In this video; Raymond Lacoste demonstrates how to ensure that DHCPv6 messages leave the LAN.

67263
Switch 2.0: Dhcpv6: Example Raymond Lacoste

SWITCH 2.0 allows you to operate a multilayer switches at the Distribution layer of the DHCPv6 servers. This is because they are relatively close to the end stations and good default gateways. In this video; Raymond Lacoste demonstrates how to combine default gateways with DHCPv6 pools.

67260
Switch 2.0: Discovering Neighbors Using Lldp Dan Young

In SWITCH 2.0; LLDP and CDP can be used to identify information about neighbors. In this video; Dan Young demonstrates how to use the show lldp neighbors command to retrieve information on neighborships; and how to interpret this data.

67210
Switch 2.0: Distributed Hardware Forwarding Raymond Lacoste

In SWITCH 2.0; Catalyst switch architecture is broken into three planes – the Management Plane; the Control Plane; and the Data Plane. In this video; Raymond Lacoste discusses the features and functions of the three planes and explains how they work together for switch processing.

67203
Switch 2.0: Dynamic Arp Inspection Raymond Lacoste

In SWITCH 2.0; you can protect against ARP spoofing attacks using Dynamic ARP Inspection (DAI). DAI tracks IP-to-MAC bindings from DHCP transactions to protect against ARP poisoning. In this video; Raymond Lacoste discusses the features of DAI in protecting against ARP spoofing attacks.

67382
Switch 2.0: Dynamic Trunking Protocol Dan Young

In SWITCH 2.0; you can use the Dynamic Trunking Protocol (DTP) to enable trunking on a link between two VLAN switches. DTP contains various switchport mode settings. In this video; Dan Young demonstrates how to run the DTP and the various switchport settings.

67224
Switch 2.0: Enabling Lldp Dan Young

In SWITCH 2.0; you can use both CDP and LLDP. Both protocols are similar but LLDP includes several more features. In this video; Dan Young uses demonstrates how to use CDP in order to use LLDP and explains some of the other features of LLDP.

67209
Switch 2.0: End-to-end Vs. Local Vlans Dan Young

SWITCH 2.0 allows you to configure LANs to communicate as if they are attached to the same link – these are called VLANs. VLANs can be deployed as end-to-end VLANs or local VLANs. In this video; Dan Young discusses these two deployment strategies and their advantages and disadvantages.

67226
Switch 2.0: Error Disabled Port Automatic Recovery Dan Young

When using SWITCH 2.0; you need to be familiar with port error conditions and how to deal with port errors if they occur. In this video; Dan Young discusses how to handle port errors when they occur in SWITCH 2.0.

67445
Switch 2.0: Etherchannel Guard Raymond Lacoste

In SWITCH 2.0; you need to ensure EtherChannels aren’t misconfigured as this could result in a spanning-tree loop. In this video; Raymond Lacoste demonstrates how to use the EtherChannel misconfig guard feature to safeguard a catalyst switch; DSW1.

67274
Switch 2.0: Etherchannel Load Balancing Configuration Raymond Lacoste

SWITCH 2.0 allows you to control the quantity of traffic entering and exiting your EtherChannel bundle using a command. In this video; Raymond Lacoste demonstrates how to verify that the load balancing command is enabled and correctly implemented.

67273
Switch 2.0: Etherchannel Load-balancing Overview Raymond Lacoste

In SWITCH 2.0; you can control the traffic distribution flow across the physical interfaces which are part of the EtherChannel bundle. In this video; Raymond Lacoste discusses when and why you would use load-balancing to control the traffic distribution flow.

67272
Switch 2.0: Etherchannel Overview Raymond Lacoste

In SWITCH 2.0; you need to consider the link speeds between layers. Slow link speeds could cause congestion resulting in dropped voice; video; and teleconferencing packets. In this video; Raymond Lacoste demonstrates how to identify the possible areas of congestion caused by slow link speeds; and the consequences of this congestion.

67264
Switch 2.0: Etherchannel Verification Raymond Lacoste

SWITCH 2.0 allows you to verify the EtherChannel configurations. You can do this by applying the show etherchannel summary command. In this video; Raymond Lacoste demonstrates the steps involved within this verification process.

67271
Switch 2.0: Examining Stp Timers Raymond Lacoste

In SWITCH 2.0; Spanning Tree Protocol (STP) uses several timers; including the hello timer and the max age timer; and the forwarding delay. In this video; Raymond Lacoste demonstrates how STP topology passes through the transition states and highlights the timing in each state.

67291
Switch 2.0: Fhrps For Ipv6 Raymond Lacoste

In SWITCH 2.0; you can implement First Hop Redundancy Protocols (FHRPs); such as the Hot Standby Router Protocol (HSRP) and Gateway Load Balancing Protocol (GLBP); with IPv6. In this video; Raymond Lacoste demonstrates the process for autoconfiguring a virtual IP address and setting its priorities in IPv4 and IPv6.

67428
Switch 2.0: First Hop Redundancy Raymond Lacoste

In SWITCH 2.0; First Hop Redundancy Protocols are used to protect services in the event that a router link fails. Clients are configured with an IP address that can be shared amongst multiple routers that act as default gateways. In this video; Raymond Lacoste discusses the configuration and function of First Hop Redundancy Protocols.

67396
Switch 2.0: Dhcpv6 Lite Overview Raymond Lacoste

In SWITCH 2.0; you can combine the best of stateless autoconfiguration with DHCPv6 to create stateless DHCPv6. In this video; Raymond Lacoste discusses the best features of both stateless autoconfiguration and DHCPv6; and how to combine them.

67261
Switch 2.0: Configuring The Eigrp Network Statement On A Multilayer Switch Dan Young

SWITCH 2.0 allows you to use wildcard masks when you implement your dynamic routing protocol on a router or multilayer switch. In this video; Dan Young demonstrate how an EIGRP routing protocol configuration is created and review the essential components of the process.

67353
Switch 2.0: Configuring The Local User Database Dan Young

When using SWITCH 2.0; you need to be familiar with the process for configuring Authentication; Authorization; and Accounting (AAA). In this video; Dan Young demonstrates how to configure the local user database for AAA and preparing a user for fallback.

67229
Switch 2.0: Configuring The Timezone Dan Young

In SWITCH 2.0; you can enable the correct time zone on a switch and adjust it for daylight saving time; if required. In this video; Dan Young demonstrates how to configure the correct time zone and modify the daylight saving time on a switch.

67359
Switch 2.0: Configuring Tracking In Glbp I Raymond Lacoste

SWITCH 2.0 allows you to initiate tracking with the Gateway Load Balancing Protocol (GLBP) by using weight values. In this video; Raymond Lacoste demonstrates how to implement Active Virtual Forwarder (AVF) Tracking to deal with broken links and explains how to use weight values during implementation.

67426
Switch 2.0: Configuring Tracking In Glbp Ii Raymond Lacoste

When using SWITCH 2.0; you should be familiar with the process of object tracking. In this video; Raymond Lacoste demonstrates the process of configuring object tracking to deal with the failure of a link within a group using SWITCH 2.0.

67452
Switch 2.0: Configuring Trunks Dan Young

In SWITCH 2.0; you can use the Dynamic Trunking Protocol (DTP) to enable trunking on a link between two VLAN switches. When performing trunking you can use the switchport mode command. In this video; Dan Young demonstrates how to configure trunk links in your environment.

67225
Switch 2.0: Creating Vlans I Dan Young

In SWITCH 2.0; you can create; define; and deploy VLANs by logical partitioning. In this video; Dan Young demonstrates how to create new VLAN networks by using specific commands and explains the importance of VLANs in defining the spaces in a switch block.

67219
Switch 2.0: Creating Vlans Ii Dan Young

SWITCH 2.0 allows you to create and define VLANS. You can then deploy these VLANs with switch port access. In this video; Dan Young demonstrates the steps in deploying the newly created VLANs to specific access layer points.

67220
Switch 2.0: Defining The Secondary Root Bridge Raymond Lacoste

In this video; Raymond Lacoste defines the secondary root bridge in SWITCH 2.0.

67297
Switch 2.0: Dhcp Configuration I Raymond Lacoste

SWITCH 2.0 allows you to configure multilayer switches as Dynamic Host Configuration Protocol (DHCP) servers at the Distribution layer. This removes the need to have DHCP servers in each client broadcast domain. In this video; Raymond Lacoste discusses the configuration of multilayer switches as DHCP servers and the various options available to extend the functionality of DHCP.

67249
Switch 2.0: Dhcp Configuration Ii Raymond Lacoste

In SWITCH 2.0; you can configure multilayer switches as Dynamic Host Configuration Protocol (DHCP) servers at the Distribution layer. In this video; Raymond Lacoste demonstrates how to configure the DHCP service and add an option to extend its functionality in an example.

67250
Switch 2.0: Dhcp Negotiation I Raymond Lacoste

In SWITCH 2.0; there are four primary Dynamic Host Configuration Protocol (DHCP) messages that communicate between a client and a DHCP server in the DHCP negotiation process. These are Discover; Offer; Request; and Acknowledgement; and are collectively known as the DORA process. In this video; Raymond Lacoste demonstrates the steps involved in the DHCP negotiation process.

67245
Switch 2.0: Dhcp Negotiation Ii Raymond Lacoste

In SWITCH 2.0; four primary Dynamic Host Configuration Protocol (DHCP) messages communicate between a client and a DHCP server in the DHCP negotiation process: Discover; Offer; Request; and Acknowledgement (DORA). In this video; Raymond Lacoste discusses how these four messages work together in DCHP negotiation.

67246
Switch 2.0: Dhcp Negotiation Iii Raymond Lacoste

In SWITCH 2.0; primary Dynamic Host Configuration Protocol (DHCP) messages communicate between a client and a DHCP server in the DHCP negotiation process. Some of these messages are broadcast messages. In this video; Raymond Lacoste demonstrates the steps when the DHCP server is not in the same broadcast domain as the client.

67247
Switch 2.0: Dhcp Overview Raymond Lacoste

In SWITCH 2.0; Dynamic Host Configuration Protocol (DHCP) allows you to manage all IP addresses that have been deployed within an organization. While some devices may be assigned a static IP address; the majority of other devices can be managed using DHCP. In this video; Raymond Lacoste discusses the features of DHCP.

67244
Switch 2.0: Dhcp Snooping Configuration Raymond Lacoste

SWITCH 2.0 allows you to protect the infrastructure against DHCP spoofing attacks by implementing DHCP snooping – a security element that serves as a firewall between trusted and untrusted ports. In this video; Raymond Lacoste demonstrates how to configure DHCP snooping with SWITCH 2.0.

67335
Switch 2.0: Dhcp Snooping Observed Raymond Lacoste

In SWITCH 2.0; you can protect a network infrastructure against DHCP spoofing attacks by implementing DHCP snooping. The DHCP snooping configuration process involves enabling DHCP globally; specifying which VLANs to configure DHCP snooping for; and specifying which interfaces to trust. In this video; Raymond Lacoste demonstrates how to configure DHCP snooping.

67340
Switch 2.0: Dhcp Snooping Operation Raymond Lacoste

In SWITCH 2.0; you need to know how to protect a network infrastructure against DHCP spoofing attacks by implementing the DHCP snooping feature. In this video; Raymond Lacoste discusses DHCP snooping operations and explains how this feature serves as a firewall between trusted and untrusted ports.

67262
Switch 2.0: Dhcp Spoofing Attacks Raymond Lacoste

When working with SWITCH 2.0; you need to be aware of DHCP spoofing attacks against a DCHP server. DHCP spoofing occurs if a device in a network pretends to be a DHCP server; leading to attacks such as denial-of-service. In this video; Raymond Lacoste discusses DHCP spoofing.

67259
Switch 2.0: Configuring System Clock Dan Young

In SWITCH 2.0; you need to manually configure a clock system because not all hardware-based devices are perfect at keeping time. In this video; Dan Young demonstrates how to configure the clock system and discusses the benefits of doing this.

67358
Switch 2.0: Cisco Switching Methods I Raymond Lacoste

In SWITCH 2.0; there are three switching methods for moving packets from an ingress interface to an egress interface: process switching; fast switching; and Cisco Express Forwarding. In this video; Raymond Lacoste explains the features of the process and fast switching methods; and the advantages and disadvantages of each.

67204
Switch 2.0: Cisco Switching Methods Ii Raymond Lacoste

SWITCH 2.0 includes more efficient methods and easier access to information when forwarding packets to allow faster switching. In this video; Ray Lacoste demonstrates how to use the Express Forwarding feature to perform a catalyst switch by collecting information in tables ahead of the switch time.

67205
Switch 2.0: Comparing Loopguard With Udld Raymond Lacoste

In SWITCH 2.0; the LoopGuard and Unidirectional Link Detection (UDLD) features allow you to detect unidirectional links. Both LoopGuard and UDLD have different characteristics but can be implemented together to obtain a high level of protection. In this video; Raymond Lacoste discusses LoopGuard and UDLD and highlights the difference between them.

67323
Switch 2.0: Comparison Of Rstp And Stp Port States Raymond Lacoste

SWITCH 2.0 provides support for the Spanning Tree Protocol (STP) and its faster version; Rapid Spanning Tree Protocol (RSTP). These protocols allow you to control a spanning-tree topology. In this video; Raymond Lacoste provides discusses the differences between STP and RSTP port roles and states.

67303
Switch 2.0: Configuration Raymond Lacoste

In SWITCH 2.0; you can use IP source guard to protect against spoofed IP addresses by comparing inbound packets against the DHCP binding table. Once DHCP snooping is configured; the IP source guard configuration is a straightforward process. In this video; Raymond Lacoste demonstrates the steps involved in configuring IP source guard with SWITCH 2.0.

67367
Switch 2.0: Configuration Of A Routed Interface On A Catalyst Switch Dan Young

SWITCH 2.0 allows you to configure Layer 3 links to successfully deploy multilayer switches. In this video; Dan Young demonstrates how to configure a routed port.

67350
Switch 2.0: Configuring A Radius Group Dan Young

Using SWITCH 2.0; you can configure a Remote Authentication Dial-In User Service (RADIUS) group for console and Virtual teletype (VTY) access by pointing your servers to the RADIUS server. In this video; Dan Young demonstrates how to configure RADIUS for console and VTY access.

67240
Switch 2.0: Configuring A Tacacs+ Group Dan Young

Using SWITCH 2.0; you can configure a Terminal Access Controller Access-Control System (TACACS+) for console and virtual teletype (VTY) access. To do this; you need to know how to configure a TACACS+ server and associate it with a server group. In this video; Dan Young demonstrates how to configure TACACS+ for console and VTY access in SWITCH 2.0.

67241
Switch 2.0: Configuring And Verifying Poe Dan Young

In SWITCH 2.0; managing Power over Ethernet (PoE) is straightforward at the individual device level. In this video; Dan Young demonstrates how to manage some of the features of PoE including inline power levels.

67216
Switch 2.0: Configuring Authentication For Ip Sla Dan Young

In SWITCH 2.0; you can collect information about network performance in real time to help assess network functionality. But in order to ensure that responses on a network are secure; you need to authenticate the SLA. In this video; Dan Young demonstrates how to implement authentication for SLAs within an IP network.

67384
Switch 2.0: Configuring Authorization And Accounting Dan Young

In SWITCH 2.0; the three As – authentication; authorization; and accounting (AAA) – are important when performing routing and switching. Configuring authorization and accounting is especially important to ensure a secure network configuration. In this video; Dan Young demonstrates how to configure authorization and accounting.

67242
Switch 2.0: Configuring Glbp I Raymond Lacoste

In SWITCH 2.0; you can configure the Gateway Load Balancing Protocol (GLBP). In this video; Raymond Lacoste demonstrates how to configure GLBP by explaining the commands used and outlines keywords that you should be familiar with.

67421
Switch 2.0: Configuring Glbp Ii Raymond Lacoste

When using SWITCH 2.0; you should have a firm grasp of the process required to configure the Gateway Load Balancing Protocol (GLBP). In this video; Raymond Lacoste demonstrates the process of creating active virtual gateways (AVGs) and active virtual forwarders (AVFs) with GLBP.

67450
Switch 2.0: Configuring Hsrp In A Multiple Vlan Deployment Raymond Lacoste

In SWITCH 2.0; you can configure Hot Standby Router Protocol (HSRP) for a group associated with a different VLAN. When configuring this; it is useful; but not essential; to give the group the same name as the VLAN. In this video; Raymond Lacoste demonstrates the configuration of HSRP in a multiple VLAN deployment.

67406
Switch 2.0: Configuring Mst Path Cost Raymond Lacoste

In SWITCH 2.0; you can use Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) to identify the quickest path to the root bridge. You can use this information to manipulate the cost of an interface. In this video; Raymond Lacoste demonstrates how to configure Multiple Spanning Tree (MST) path cost.

67336
Switch 2.0: Configuring Mst Port Priority Raymond Lacoste

SWITCH 2.0 allows you to design a Multiple Spanning Tree (MST) configuration; with a separate spanning tree for each VLAN in the topology. You can also configure MST ports to determine which one has priority when a route is being selected. In this video; Raymond Lacoste demonstrates configuring MST port priority.

67337
Switch 2.0: Configuring Mstp Raymond Lacoste

In SWITCH 2.0; you can group Multiple Spanning Tree Protocol VLANs together in instances where they have the same spanning-tree topology. In this video; Raymond Lacoste demonstrates how to configure transition from Spanning Tree Protocol to Multiple Spanning Tree Protocol in a topology.

67332
Switch 2.0: Configuring Mstp Example Raymond Lacoste

Multiple Spanning Tree Protocol in SWITCH 2.0 allows you to configure a separate spanning tree for each VLAN on the network. When configuring Multiple Spanning Tree Protocol; you need to specify several elements; such as a region name and number. In this video; Raymond Lacoste demonstrates how to configure Multiple Spanning Tree Protocol in an example.

67331
Switch 2.0: Configuring Ntp Dan Young

In SWITCH 2.0; you can control the methods in which Network Time Protocol (NTP) is implemented and change the configuration. In this video; Dan Young demonstrates how to configure an NTP using configuration commands.

67364
Switch 2.0: Configuring Port Security Dan Young

In SWITCH 2.0; you need to be familiar with port security configurations to defend a network against potential attacks. In this video; Dan Young discusses various features that are available to configure and enhance port security by means of an example in SWITCH 2.0.

67443
Switch 2.0: 802.1x Configuration Checklist Dan Young

When using SWITCH 2.0 to configure IEEE 802.1x; there is a handy checklist you can follow to ensure solid authentication. This list covers five points – enabling AAA; defining a RADIUS server; creating an 802.1x authentication method list; enabling 802.1x authentication globally on the switch; and enabling 802.1x authentication on the port. In this video; Dan Young discusses the IEEE 802.1x configuration checklist.

67251
Switch 2.0: Aaa Authentication Options Dan Young

When using SWITCH 2.0; you need to have a good understanding of the uses and characteristics of authentication as well as how to implement it. In this video; Dan Young discusses the various uses of authentication on a network demonstrates how to configure it.

67215
Switch 2.0: Aaa Overview Dan Young

When using SWITCH 2.0; you should be familiar with the concepts of Authentication; Authorization; and Accounting (AAA). In this video; Dan Young discusses the concepts of AAA and explains the requirements of AAA within a network context when using SWITCH 2.0.

67460
Switch 2.0: Advertising The Subnet Of Vlans Using Eigrp Dan Young

In SWITCH 2.0; you can advertise the subnets that exist in the VLANs to the rest of the domain when setting up EIGRP on a multilayer switch. In this video; Dan Young demonstrates how to configure such a routing protocol and the challenges that may be encountered.

67352
Switch 2.0: Analyzing An Stp Topology I Raymond Lacoste

In SWITCH 2.0; Spanning Tree Protocol (STP) topology contains several different components; including a root bridge; root ports; designated ports; and blocked ports. There are several ways of analyzing an STP topology; using show commands and other data. In this video; Raymond Lacoste demonstrates how to analyze an STP topology to determine the root bridge.

67286
Switch 2.0: Analyzing An Stp Topology Ii Raymond Lacoste

The Spanning Tree Protocol (STP) topology in SWITCH 2.0 contains the root bridge; root ports; designated ports; and blocked ports components. You can analyze an STP topology; using show commands and other data. In this video; Raymond Lacoste demonstrates how to analyze an STP topology to determine the root ports.

67287
Switch 2.0: Analyzing An Stp Topology Iii Raymond Lacoste

In SWITCH 2.0; Spanning Tree Protocol (STP) topology could contain these components: a root bridge; root ports; designated ports; and blocked ports. In this video; Raymond Lacoste demonstrates how to analyze an STP topology to determine the designated ports.

67288
Switch 2.0: Applications Dan Young

In SWITCH 2.0; you can use an IP service-level agreements (SLAs) to monitor the performance and connectivity of an IP network as well as the services that rely on it. In this video; Dan Young demonstrates how service-level agreements can be used within an IP network.

67379
Switch 2.0: Applying Vtp To The Switch Block Dan Young

In SWITCH 2.0; you need to follow these steps to configure VLAN Trunk Protocol (VTP). First the VTP server must be configured with its mode; domain name; version; and password. Then only can the VTP client be configured. In this video; Dan Young demonstrates how to set up VTP on both the server and client ends.

67237
Switch 2.0: Arp Spoofing Raymond Lacoste

In SWITCH 2.0; ARP spoofing is a type of attack that corrupts the ARP cache of a legitimate network device using gratuitous ARP replies. ARP spoofing is a relatively easy attack as there are a number of ARP spoofing tools readily available online. In this video; Raymond Lacoste discusses the features and impact of ARP spoofing attacks.

67376
Switch 2.0: Assigning Switch Ports To Private Vlans Raymond Lacoste

In this video; Raymond Lacoste demonstrates how to configure switch ports to private VLANs.

67464
Switch 2.0: Cam And Tcam Tables Raymond Lacoste

In SWITCH 2.0; switches forward frames at a high rate of speed and to accomplish this; the information that is needed to forward data must be stored in hardware memory tables known as Content Addressable Memory (CAM) and Ternary Content Addressable Memory (TCAM). In this video; Raymond Lacoste discusses the function of CAM and TCAM and the differences between them.

67198
Switch 2.0: Campus Network Design Without The Core Layer Dan Young

In SWITCH 2.0; you can use core devices to implement scalable protocols and technologies; alternate paths; and load balancing. In this video; Dan Young demonstrates a Campus Network without the Core Layer and discusses why having a Core Layer is necessary.

67193
Switch 2.0: Challenges In A Redundant Topology Raymond Lacoste

In this video; Raymond Lacoste discusses challenges in a redundant topology in SWITCH 2.0.

67318
Switch 2.0: Changing Stp Priority Raymond Lacoste

SWITCH 2.0 allows you to maintain control of a spanning-tree topology using the Per VLAN Spanning Tree Plus. To indicate which switch will be the root bridge. In this video; Raymond Lacoste discusses how to change the bridge priority of a switch.

67295
Switch 2.0: Changing The Sdm Template Raymond Lacoste

SWITCH 2.0 allows you to change the SDM templates if necessary. In this video; Raymond Lacoste discusses explore the resources being used by SDM templates and the considerations for changing of these templates.

67207
Switch 2.0: Cisco Enterprise Campus Architecture Dan Young

In SWITCH 2.0; you can create a dialogue design pre-set by building Cisco enterprise campus architecture. In this video; Dan Young demonstrates how this architecture is made up of three layers and the features associated with each layer.

67189
Switch 2.0: Cisco Flexlinks Raymond Lacoste

In this video; Raymond Lacoste provides an overview and demonstration of Cisco FlexLinks in SWITCH 2.0.

67325
Switch 2.0: Cisco Ios Ip Sla Example Dan Young

In SWITCH 2.0; it’s important to ensure the IP service level agreement (SLA) is configured appropriately to ensure you receive the full benefit of using it within an IP network. In this video; Dan Young demonstrates the steps for configuring an IP SLA by means of an example.

67381
Switch 2.0: Cisco Stp Toolkit Raymond Lacoste

In this video; Raymond Lacoste provides an overview of the Cisco STP toolkit in SWITCH 2.0.

67310
Spngn 1: Wans Vs Lans Dan Young

After watching this video; you will be able to contrast WANs vs LANs.

86578
Spngn 1: What A Subnet Mask Does Dan Young

After watching this video; you will be able to describe what a subnet mask does.

86437
Spngn 1: What Is A Vpn? Dan Young

After watching this video; you will be able to describe VPNs.

86643
Spngn 1: What Is Ipsec? Dan Young

After watching this video; you will be able to describe the IPsec framework.

86668
Spngn 1: What Is Vlsm Dan Young

After watching this video; you will be able to describe the function of VLSM.

86439
Spngn 1: Why A Layered Network Model Dan Young

After watching this video; you will be able to describe the purpose of a layered network model.

86373
Spngn 1: Working With Cisco Ios Dan Young

After watching this video; you will be able to describe working with Cisco IOS.

86483
Switch 2.0 – Switch Security Recommended Practices: Configuring Secure Passwords Dan Young

In SWITCH 2.0; there are a number of recommended security practices; including configuring secure passwords to protect against vulnerabilities in the switch fabric or routers. In this video; Dan Young demonstrates the process of enabling secret passwords and encrypting passwords.

67430
Switch 2.0 – Switch Security Recommended Practices: Securing Cdp Dan Young

In this video; Dan Young discusses securing SNMP access as a switch security recommended practice in SWITCH 2.0.

67438
Switch 2.0 – Switch Security Recommended Practices: Securing Console Access Dan Young

SWITCH 2.0 recommends security best practices; such as securing console access and turning off a console port if a device is exposed and cannot physically be placed behind locked doors. In this video; Dan Young discusses the various commands involved in configuring secure console access.

67432
Switch 2.0 – Switch Security Recommended Practices: Securing Snmp Access Dan Young

In this video; Dan Young discusses securing SNMP access as a switch security recommended practice in SWITCH 2.0.

67436
Switch 2.0 – Switch Security Recommended Practices: Securing Stp Dan Young

Spanning Tree Protocol (STP) is a recommended security practices for SWITCH 2.0. The nature of STP is that it is open for switches to participate with; but this leaves it vulnerable to attack. In this video; Dan Young discusses how STP uses BPDU guards on access ports to improve STP security.

67437
Switch 2.0 – Switch Security Recommended Practices: Securing Unused Switch Ports Dan Young

In SWITCH 2.0; you can use a number of recommended security practices; including securing unused switch ports. Recommended procedures include shutting down unused ports; disabling Dynamic Trunk Protocol (DTP) negotiation on switchports; and putting any ports which were accidentally enabled into quarantine. In this video; Dan Young discusses these security procedures for unused ports.

67439
Switch 2.0 – Switch Security Recommended Practices: Securing Vty Access Dan Young

In SWITCH 2.0; you can use various security best practices; such as including securing Virtual teletype (VTY) access. In this video; Dan Young demonstrates how to apply a standard access list to VTY lines to constrain the IP addresses that have access to physical devices.

67433
Switch 2.0 – Switch Security Recommended Practices: Securing Web Access Dan Young

SWITCH 2.0 recommends security best practices; such as how to secure web access when managing switches via a web interface. In this video; Dan Young discusses the security challenges inherent to web access and demonstrates how to make web interfaces more secure.

67434
Switch 2.0 – Switch Security Recommended Practices: Using Ssh Instead Of Telnet Dan Young

There are a number of recommended security practices for SWITCH 2.0; including using Secure Shell (SSH) instead of Telnet. While Telnet is straightforward to use; login credentials are exchanged in clear text; which leaves it open to security breaches. SSH; particularly Version 2; is powerfully secured. In this video; Dan Young demonstrates how to configure SSH.

67435
Switch 2.0 – Switch Security Recommended Practices: Using System Banners Dan Young

In this video; Dan Young discusses recommended practices related to using system banners for switch security in SWITCH 2.0.

67431
Switch 2.0 Hsrp Object Tracking Scenario Raymond Lacoste

In SWITCH 2.0; object tracking in Hot Standby Router Protocol (HSRP) allows the monitoring of specific objects; rather than only directly-connected uplinks. These objects may be interfaces or values in a routing table. In this video; Raymond Lacoste discusses object tracking.

67409
Switch 2.0 Native First Hop Redundancy In Ipv6 Raymond Lacoste

SWITCH 2.0 allows you to use the First Hop Redundancy Protocol (FHRP) at the default gateway when dealing with router advertisement; failover times; and preemptive actions. In this video; Raymond Lacoste demonstrates how to use FHRP and GLBP in IPv6 at the default gateway.

67427
Spngn 1: Wan Protocols Dan Young

After watching this video; you will be able to describe WAN protocols.

86582
Spngn 1: Understanding Span Dan Young

After watching this video; you will be able to describe the need for SPAN.

86683
Spngn 1: Understanding System Message Logging Dan Young

After watching this video; you will be able to describe system message logging.

86679
Spngn 1: Unique Local Ipv6 Unicast Addresses Dan Young

After watching this video; you will be able to describe unique local IPv6 unicast addresses.

86402
Spngn 1: Unshielded Twisted-pair Cable Dan Young

After watching this video; you will be able to list characteristics of UTP.

86465
Spngn 1: Utp Ethernet Cabling Dan Young

After watching this video; you will be able to describe UTP Ethernet cabling.

86467
Spngn 1: Variable-length Subnet Mask Dan Young

After watching this video; you will be able to use VLSM.

86452
Spngn 1: Verification (autosummarization Disabled) Raymond Lacoste

After watching this video; you will be able to verify EIGRP routes.

86563
Spngn 1: Verifying Port Security Dan Young

After watching this video; you will be able to verify port security.

86510
Spngn 1: Verifying The Ppp Encapsulation Configuration Dan Young

After watching this video; you will be able to verify a PPP-enabled interface.

86636
Spngn 1: Verifying The Rip Configuration Raymond Lacoste

After watching this video; you will be able to verify RIP configuration.

86555
Spngn 1: Versions Of Cisco Ios Raymond Lacoste

After watching this video; you will be able to list versions of Cisco IOS.

86655
Spngn 1: Viewing Ios Configuration Dan Young

After watching this video; you will be able to review the configuration of an IOS device.

86492
Spngn 1: Vlsm Exercise 1 Dan Young

After watching this video; you will be able to Complete VLSM Exercise 1.

86453
Spngn 1: Vlsm Exercise 2 Dan Young

After watching this video; you will be able to Complete VLSM Exercise 2.

86454
Spngn 1: Vrf Routing And Forwarding Raymond Lacoste

After watching this video; you will be able to describe virtual routing and forwarding.

86662
Spngn 1: Wan Access And The Osi Reference Model Dan Young

After watching this video; you will be able to compare WAN access against the OSI model.

86586
Spngn 1: Wan Hardware Dan Young

After watching this video; you will be able to describe WAN Hardware.

86579
Spngn 1: Wan Link Options (part 1) Dan Young

After watching this video; you will be able to identify WAN link options.

86583
Spngn 1: Wan Link Options (part 2) Dan Young

After watching this video; you will be able to identify WAN link options.

86584
Spngn 1: Wan Link Options (part 3) Dan Young

After watching this video; you will be able to identify WAN link options.

86585
Spngn 1: Tcp Characteristics Dan Young

After watching this video; you will be able to describe characteristics of TCP.

86419
Spngn 1: Tcp Sequence And Acknowledgment Numbers Dan Young

After watching this video; you will be able to identify TCP sequence and acknowledgment numbers.

86425
Spngn 1: Tcp Windowing Dan Young

After watching this video; you will be able to describe TCP windowing.

86426
Spngn 1: Tcp/ip Stack Dan Young

After watching this video; you will be able to describe the TCP/IP Stack.

86381
Spngn 1: Tcp/ip Stack Versus The Osi Model Dan Young

After watching this video; you will be able to compare the TCP/IP Stack and OSI Model.

86382
Spngn 1: Tcp_ip Application Layer Overview Dan Young

After watching this video; you will be able to describe the Application Layer of the TCP/IP suite.

86420
Spngn 1: Telnet And Ssh Dan Young

After watching this video; you will be able to contrast Telnet and SSH.

86507
Spngn 1: Telnet Connection To Remote Devices Raymond Lacoste

After watching this video; you will be able to establish a Telnet connection.

86575
Spngn 1: Telnet Vs. Ssh Access Raymond Lacoste

After watching this video; you will be able to compare Telnet vs. SSH.

86570
Spngn 1: The Global Internet Dan Young

After watching this video; you will be able to describe the Internet.

86611
Spngn 1: The Show Flash Command Dan Young

After watching this video; you will be able to use the show flash command.

86490
Spngn 1: The Show Interfaces Command Dan Young

After watching this video; you will be able to use the show interfaces command.

86538
Spngn 1: The Show Version Command Dan Young

After watching this video; you will be able to use the show version command.

86489
Spngn 1: Threat Capabilities Dan Young

After watching this video; you will be able to identify threats to the network.

86428
Spngn 1: Transport Layer Dan Young

After watching this video; you will be able to describe the Transport Layer of the TCP/IP suite.

86417
Spngn 1: Transport Of Carrier Ethernet Services Dan Young

After watching this video; you will be able to describe transport of carrier Ethernet services.

86588
Spngn 1: Types Of Physical Connections Dan Young

After watching this video; you will be able to identify the types of physical connections.

86372
Spngn 1: Udp Characteristics Dan Young

After watching this video; you will be able to describe characteristics of UDP.

86418
Spngn 1: Understanding Administrative Distance Raymond Lacoste

After watching this video; you will be able to define administrative distance.

86653
Spngn 1: Understanding Configuration Failures Raymond Lacoste

After watching this video; you will be able to recognize configuration failures.

86663
Spngn 1: Spanning Tree Operation Dan Young

After watching this video; you will be able to describe Spanning Tree operation.

86524
Spngn 1: Spanning Tree Port States Dan Young

After watching this video; you will be able to describe Spanning Tree port states.

86526
Spngn 1: Spanning Tree Standards Dan Young

After watching this video; you will be able to identify Spanning Tree standards.

86522
Spngn 1: Special-purpose Ipv6 Unicast Addresses Dan Young

After watching this video; you will be able to list special-purpose IPv6 unicast addresses.

86403
Spngn 1: Speed-related Issues Dan Young

After watching this video; you will be able to identify speed-related issues for Ethernet connectivity.

86542
Spngn 1: Ssl Vpns Dan Young

After watching this video; you will be able to describe SSL VPNs.

86670
Spngn 1: Star And Extended-star Topologies Dan Young

After watching this video; you will be able to identify star and extended-star topologies.

86370
Spngn 1: Stateless Ipv6 Autoconfiguration Dan Young

After watching this video; you will be able to describe IPv6 Stateless Autoconfiguration.

86410
Spngn 1: Static Nat Dan Young

After watching this video; you will be able to describe the use of static NAT.

86616
Spngn 1: Static Route Configuration (part 1) Raymond Lacoste

After watching this video; you will be able to configure static routes.

86544
Spngn 1: Static Route Configuration (part 2) Raymond Lacoste

After watching this video; you will be able to configure static routes.

86545
Spngn 1: Static Vs Dynamic Nat Dan Young

After watching this video; you will be able to contrast static and dynamic NAT.

86618
Spngn 1: Subnet Zero And All-ones Subnet Dan Young

After watching this video; you will be able to identify subnet zero and the all-ones subnet.

86446
Spngn 1: Switch Features Dan Young

After watching this video; you will be able to list switch features.

86479
Spngn 1: Switching Operation Dan Young

After watching this video; you will be able to describe switching operation.

86480
Spngn 1: Syslog Message Format Dan Young

After watching this video; you will be able to describe the Syslog message format.

86680
Spngn 1: T1 Or E1 And T3 Or E3 Dan Young

After watching this video; you will be able to recognize WAN connection speeds.

86597
Spngn 1: Tables Raymond Lacoste

After watching this video; you will be able to describe RIPng routing tables.

86558
Spngn 1: Task Groups And User Groups Raymond Lacoste

After watching this video; you will be able to describe task groups and user groups.

86571
Spngn 1: Spanning Tree Cost And Priority Dan Young

After watching this video; you will be able to describe the role of cost and priority in STP.

86525
Spngn 1: Router Security Overview Raymond Lacoste

After watching this video; you will be able to describe aspects of router security.

86568
Spngn 1: Routing Considerations Raymond Lacoste

After watching this video; you will be able to identify routing considerations when using a tunnel.

86706
Spngn 1: Routing Loops Raymond Lacoste

After watching this video; you will be able to describe how a routing loop can occur.

86549
Spngn 1: Routing Protocol Raymond Lacoste

After watching this video; you will be able to describe the purpose of a routing protocol.

86546
Spngn 1: Routing Table Entries Raymond Lacoste

After watching this video; you will be able to identify components of routing table elements.

86650
Spngn 1: Routing Table Information Raymond Lacoste

After watching this video; you will be able to interpret the routing table.

86651
Spngn 1: Rstp Improvements Dan Young

After watching this video; you will be able to describe RSTP improvements of STP.

86527
Spngn 1: Saving And Backing Up The Configuration Dan Young

After watching this video; you will be able to save and restore configurations on an IOS device.

86496
Spngn 1: Securing Unused Ports Dan Young

After watching this video; you will be able to secure unused ports.

86512
Spngn 1: Serial Point-to-point Connections Dan Young

After watching this video; you will be able to describe serial point-to-point connections.

86581
Spngn 1: Service Provider Access And Edge Technologies In The Cisco Ip Ngn Model Dan Young

After watching this video; you will be able to describe service provider access and edge technologies in the Cisco IP NGN model.

86590
Spngn 1: Service Provider Specific Attacks Dan Young

After watching this video; you will be able to list service provider specific attacks.

86435
Spngn 1: Service Provider Transport Technologies In The Cisco Ip Ngn Model Dan Young

After watching this video; you will be able to describe service provider transport technologies in the Cisco IP NGN model.

86605
Spngn 1: Setting Duplex And Speed Options Dan Young

After watching this video; you will be able to configure duplex and speed options for a switch port.

86515
Spngn 1: Show Running-config And Show Startup-config Commands Dan Young

After watching this video; you will be able to contrast the output of the show running-config and show startup-config commands.

86493
Spngn 1: Simple Network Management Protocol Dan Young

After watching this video; you will be able to describe components of Simple Network Management Protocol.

86676
Spngn 1: Single-ring And Dual-ring Topologies Dan Young

After watching this video; you will be able to identify and describe single-ring and dual-ring topologies.

86369
Spngn 1: Smart Call Home Dan Young

After watching this video; you will be able to describe Cisco Smart Call Home.

86693
Spngn 1: Solution To Routing Loops_hold-down Timers Raymond Lacoste

After watching this video; you will be able to describe the hold down timer.

86550
Spngn 1: Sonet/sdh Dan Young

After watching this video; you will be able to describe and contrast SONET/SDH.

86606
Spngn 1: Rip Comparison Raymond Lacoste

After watching this video; you will be able to compare RIPv1 and RIPv2.

86553
Spngn 1: Rip Overview Raymond Lacoste

After watching this video; you will be able to describe high level RIP operation.

86552
Spngn 1: Router And Switch Internal Components Dan Young

After watching this video; you will be able to identify the purpose of the internal components of a router or switch.

86485
Spngn 1: Router Operations Dan Young

After watching this video; you will be able to describe basic router operations.

86646
Spngn 1: Router Rack Management Raymond Lacoste

After watching this video; you will be able to describe router rack management.

86648
Spngn 1: Possible Subnets And Hosts For A Class C Network Dan Young

After watching this video; you will be able to calculate subnets created for a class C network.

86444
Spngn 1: Ppp And Chap Configuration Example Dan Young

After watching this video; you will be able to describe a PPP and CHAP configuration.

86635
Spngn 1: Ppp Authentication Protocols: Pap Vs Chap Dan Young

After watching this video; you will be able to contrast PAP and CHAP.

86632
Spngn 1: Ppp Session Establishment Dan Young

After watching this video; you will be able to list the steps of PPP session establishment.

86631
Spngn 1: Pppoe Encapsulation Dan Young

After watching this video; you will be able to describe PPPoE encapsulation.

86638
Spngn 1: Pppoe Negotiation Process Dan Young

After watching this video; you will be able to describe the steps in the PPPoE negotiation process.

86639
Spngn 1: Pppoe Summary Dan Young

After watching this video; you will be able to describe advantages and disadvantages of PPPoE.

86640
Spngn 1: Private And Public Ipv4 Addresses Dan Young

After watching this video; you will be able to compare private and public IPv4 addresses.

86399
Spngn 1: Procedure For Implementing Subnets Dan Young

After watching this video; you will be able to use the procedure for implementing subnets.

86447
Spngn 1: Protocol Data Units Dan Young

After watching this video; you will be able to define Protocol Data Units.

86383
Spngn 1: Remote Authentication Servers Dan Young

After watching this video; you will be able to configure remote authentication.

86701
Spngn 1: Reserved Ipv4 Address Dan Young

After watching this video; you will be able to list the reserved IPv4 addresses and their purpose.

86398
Spngn 1: Resource-sharing Functions And Benefits Dan Young

After watching this video; you will be able to describe resource-sharing functions and benefits.

86361
Spngn 1: Restricting Access To The Switched Network Dan Young

After watching this video; you will be able to describe the need for access control on a LAN.

86508
Spngn 1: Possible Subnets And Hosts For A Class B And A Networks Dan Young

After watching this video; you will be able to calculate subnets created for a class B and A network.

86445
Spngn 1: Network Address Translation Dan Young

After watching this video; you will be able to define NAT.

86613
Spngn 1: Network Congestion Dan Young

After watching this video; you will be able to describe causes of network congestion.

86478
Spngn 1: Network Connection Dan Young

After watching this video; you will be able to configure a network connection on a host.

86414
Spngn 1: Network Interface Card (nic) Dan Young

After watching this video; you will be able to recognize a Network Interface Card (NIC).

86463
Spngn 1: Network Redundancy And Loops Dan Young

After watching this video; you will be able to describe the challenge with network redundancy.

86517
Spngn 1: Network Time Protocol Dan Young

After watching this video; you will be able to describe NTP.

86689
Spngn 1: Ntp Hierarchical Structure: Client/server Dan Young

After watching this video; you will be able to describe the NTP models.

86691
Spngn 1: Obtaining Data From Snmp Agent Dan Young

After watching this video; you will be able to describe MIBs and OIDs for data collection in SNMP.

86677
Spngn 1: Octet Values Of A Subnet Mask Dan Young

After watching this video; you will be able to describe the nature of an octet in an IP address.

86438
Spngn 1: Opening A Tac Request Dan Young

After watching this video; you will be able to describe opening a TAC request.

86694
Spngn 1: Optical Fiber Dan Young

After watching this video; you will be able to describe characteristics of fiber optic network connections.

86468
Spngn 1: Optical Transmitters Dan Young

After watching this video; you will be able to describe optical transmitters.

86471
Spngn 1: Packet Over Sonet Dan Young

After watching this video; you will be able to describe Packet over SONET.

86641
Spngn 1: Password Attack Threat Mitigation Dan Young

After watching this video; you will be able to describe steps to mitigate password attack threats.

86505
Spngn 1: Path Calculation Raymond Lacoste

After watching this video; you will be able to describe RIP path calculation.

86559
Spngn 1: Physical And Logical Topologies Dan Young

After watching this video; you will be able to describe the difference between physical and logical topologies.

86367
Spngn 1: Physical Layer Wans Dan Young

After watching this video; you will be able to describe Layer 1 of traditional WANs.

86580
Spngn 1: Port Address Translation Dan Young

After watching this video; you will be able to define PAT.

86614
Spngn 1: Port Issues Dan Young

After watching this video; you will be able to identify Ethernet port issues.

86541
Spngn 1: Port Security With Sticky Mac Address Dan Young

After watching this video; you will be able to describe Port Security with sticky learning.

86511
Spngn 1: Layered Troubleshooting Dan Young

After watching this video; you will be able to troubleshoot using a layered approach.

86535
Spngn 1: Learning New Features In Cisco Ios Versions Raymond Lacoste

After watching this video; you will be able to recognize features of Cisco IOS.

86658
Spngn 1: Loop Resolution With Stp Dan Young

After watching this video; you will be able to describe the need for STP.

86521
Spngn 1: Mac Address Dan Young

After watching this video; you will be able to identify the fields of a MAC address.

86387
Spngn 1: Mac Address Components And Notation Dan Young

After watching this video; you will be able to identify MAC address components and notation.

86461
Spngn 1: Maintaining Routing Information Raymond Lacoste

After watching this video; you will be able to describe how a routing protocol maintains routing information.

86547
Spngn 1: Managing Cisco Ios Routers Raymond Lacoste

After watching this video; you will be able to manage Cisco IOS routers.

86657
Spngn 1: Managing Committed Configurations Raymond Lacoste

After watching this video; you will be able to work with committed configurations.

86664
Spngn 1: Mapping A Physical Address To A Network Address Dan Young

After watching this video; you will be able to describe how a device maps a layer 3 address to a layer 2 address.

86393
Spngn 1: Metric Raymond Lacoste

After watching this video; you will be able to describe the RIP metric.

86560
Spngn 1: Metrics In Routing Raymond Lacoste

After watching this video; you will be able to describe the purpose of a routing metric.

86652
Spngn 1: Metro Ethernet Dan Young

After watching this video; you will be able to describe Metro Ethernet.

86594
Spngn 1: Microsegmentation Dan Young

After watching this video; you will be able to define microsegmentation.

86481
Spngn 1: Mobile Networks Dan Young

After watching this video; you will be able to describe basics of mobile networks.

86599
Spngn 1: Modern Lans Dan Young

After watching this video; you will be able to describe modern LAN technologies.

86482
Spngn 1: Modifying One Router Simultaneously Raymond Lacoste

After watching this video; you will be able to modifying routers simultaneously.

86665
Spngn 1: Multicast Ipv6 Addresses Dan Young

After watching this video; you will be able to identify multicast IPv6 addresses.

86404
Spngn 1: Need For Network Security Dan Young

After watching this video; you will be able to describe the need for network security.

86430
Spngn 1: Netflow Overview Dan Young

After watching this video; you will be able to describe the purpose of Netflow.

86682
Spngn 1: Layer 7 The Application Layer Dan Young

After watching this video; you will be able to describe OSI Model Layer 7.

86380
Spngn 1: Ipv6 Address Representation Dan Young

After watching this video; you will be able to describe how an IPv6 address is represented.

86391
Spngn 1: Ipv6 Address Structure Dan Young

After watching this video; you will be able to describe the structure of an IPv6 address.

86392
Spngn 1: Ipv6 Addresses And The Link-local Address Dan Young

After watching this video; you will be able to recognize IPv6 address types including the link-local address.

86400
Spngn 1: Ipv6 Header Format Dan Young

After watching this video; you will be able to describe the IPv6 header format.

86407
Spngn 1: Ipv6 Support For Eigrp Raymond Lacoste

After watching this video; you will be able to describe IPv6 support in EIGRP.

86564
Spngn 1: Isdn Dan Young

After watching this video; you will be able to describe ISDN.

86598
Spngn 1: Issues Of Redundant Switched Topology (part 1) Dan Young

After watching this video; you will be able to describe broadcast storms.

86518
Spngn 1: Issues Of Redundant Switched Topology (part 2) Dan Young

After watching this video; you will be able to describe multiple frame copies.

86519
Spngn 1: Issues Of Redundant Switched Topology (part 3) Dan Young

After watching this video; you will be able to describe MAC database instability.

86520
Spngn 1: L2tp Architecture Dan Young

After watching this video; you will be able to describe L2TP architecture.

86667
Spngn 1: Lan Basics And Size Dan Young

After watching this video; you will be able to describe LAN basics and their scale.

86456
Spngn 1: Lan Definition And Components Dan Young

After watching this video; you will be able to define the LAN and its components.

86455
Spngn 1: Lan Standards Dan Young

After watching this video; you will be able to identify LAN standards.

86458
Spngn 1: Layer 1 The Physical Layer Dan Young

After watching this video; you will be able to describe OSI Model Layer 1.

86374
Spngn 1: Layer 2 The Data Link Layer Dan Young

After watching this video; you will be able to describe OSI Model Layer 2.

86375
Spngn 1: Layer 3 The Network Layer Dan Young

After watching this video; you will be able to describe OSI model Layer 3.

86376
Spngn 1: Layer 4 The Transport Layer Dan Young

After watching this video; you will be able to describe OSI model Layer 4.

86377
Spngn 1: Layer 5 The Session Layer Dan Young

After watching this video; you will be able to describe OSI model Layer 5.

86378
Spngn 1: Layer 6 The Presentation Layer Dan Young

After watching this video; you will be able to describe OSI model Layer 6.

86379
Spngn 1: Ipv4 Header Format Dan Young

After watching this video; you will be able to describe the IPv4 header format.

86406
Spngn 1: Implementing Logging Raymond Lacoste

After watching this video; you will be able to configure logging.

86573
Spngn 1: Implementing Snmp Raymond Lacoste

After watching this video; you will be able to configure SNMP parameters.

86574
Spngn 1: Initial Boot-up Output From The Switch Dan Young

After watching this video; you will be able to describe the output from the initial bootup of a switch.

86499
Spngn 1: Initial Configuration Using Setup Dan Young

After watching this video; you will be able to describe how to exit the setup script.

86500
Spngn 1: Interaction With Network And Application Layer Dan Young

After watching this video; you will be able to describe how different layers interoperate in the TCP/IP suite.

86421
Spngn 1: Interpreting A Network Diagram Dan Young

After watching this video; you will be able to work with network diagrams.

86360
Spngn 1: Introducing Wans Dan Young

After watching this video; you will be able to describe WANs.

86577
Spngn 1: Ip Characteristics Dan Young

After watching this video; you will be able to list characteristics of IP.

86388
Spngn 1: Ip Over Dwdm Dan Young

After watching this video; you will be able to describe the need for CES and TDMoIP.

86609
Spngn 1: Ip Service Level Agreement Overview Dan Young

After watching this video; you will be able to describe IP SLA as a way to manage a service provider SLA.

86685
Spngn 1: Ip Sla Operations Dan Young

After watching this video; you will be able to describe aspects of IP SLA operation.

86686
Spngn 1: Ip Sla Responder Time Stamps Dan Young

After watching this video; you will be able to describe how an IP SLA responder improves accuracy of metrics.

86687
Spngn 1: Ipsec Security Services Dan Young

After watching this video; you will be able to describe the IPsec framework.

86669
Spngn 1: Ipsec Vs. Ssl Dan Young

After watching this video; you will be able to compare IPsec vs SSL.

86671
Spngn 1: Ipv4 Address Allocation And History Dan Young

After watching this video; you will be able to describe IPv4 address allocation.

86612
Spngn 1: Ipv4 Address Classes The First Octet Dan Young

After watching this video; you will be able to recognize the classes of IPv4 addresses.

86397
Spngn 1: Ipv4 Address Representation Dan Young

After watching this video; you will be able to describe how an IPv4 address is represented.

86389
Spngn 1: Ipv4 Address Structure Dan Young

After watching this video; you will be able to describe the structure of an IPv4 address.

86390
Spngn 1: Ipv4 And Ipv6 Header Comparison Dan Young

After watching this video; you will be able to Compare the IPv4 and IPv6 headers.

86408
Spngn 1: Implementing Local And External Authentication Dan Young

After watching this video; you will be able to configure local and external authentication.

86696
Spngn 1: Flex Links Dan Young

After watching this video; you will be able to describe Flex Links.

86534
Spngn 1: Flow Control Dan Young

After watching this video; you will be able to describe basic flow control operation.

86424
Spngn 1: Frame Relay Overview Dan Young

After watching this video; you will be able to describe Frame Relay.

86591
Spngn 1: Frame Relay Terminology Dan Young

After watching this video; you will be able to define Frame Relay terminology.

86592
Spngn 1: Fttx Dan Young

After watching this video; you will be able to define FTTx.

86602
Spngn 1: Full-mesh And Partial-mesh Topologies Dan Young

After watching this video; you will be able to describe characteristics of full-mesh and partial-mesh topologies.

86371
Spngn 1: Functions Of A Router Raymond Lacoste

After watching this video; you will be able to describe the functions of a router.

86649
Spngn 1: Generic Routing Encapsulation Raymond Lacoste

After watching this video; you will be able to describe Generic Routing Encapsulation.

86705
Spngn 1: Get Vpn Raymond Lacoste

After watching this video; you will be able to compare GET VPN.

86703
Spngn 1: Get Vpn Concepts Raymond Lacoste

After watching this video; you will be able to define GET VPN Concepts.

86704
Spngn 1: Global Ipv6 Unicast Addresses Dan Young

After watching this video; you will be able to recognize global IPv6 unicast addresses.

86401
Spngn 1: Gpon Dan Young

After watching this video; you will be able to define GPON.

86601
Spngn 1: Historical Overview Dan Young

After watching this video; you will be able to describe early approaches to LAN networking.

86477
Spngn 1: Host-based Tools Ping And Arp Dan Young

After watching this video; you will be able to use ping and ARP.

86395
Spngn 1: Host-based Tools Tracert Dan Young

After watching this video; you will be able to perform a Tracert.

86396
Spngn 1: Host-to-host Packet Delivery Dan Young

After watching this video; you will be able to describe how communication occurs over a network.

86394
Spngn 1: How Routers Use Subnet Masks Dan Young

After watching this video; you will be able to describe how routers use subnet masks.

86442
Spngn 1: Icmp In The Ipv6 Neighbor Discovery Dan Young

After watching this video; you will be able to describe how neighbor discovery occurs in IPv6.

86413
Spngn 1: Icmp Packets For Ipv6 Dan Young

After watching this video; you will be able to describe the purpose of ICMP Packets for IPv6.

86412
Spngn 1: Impact Of User Applications On The Network Dan Young

After watching this video; you will be able to identify the impact of user applications on the network.

86363
Spngn 1: Etherchannel Overview (part 2) Dan Young

After watching this video; you will be able to configure EtherChannel.

86532
Spngn 1: Etherchannel Overview (part 3) Dan Young

After watching this video; you will be able to configure EtherChannel.

86533
Spngn 1: Ethernet Evolution Dan Young

After watching this video; you will be able to describe how Ethernet has evolved over the years.

86457
Spngn 1: Ethernet Frame Dan Young

After watching this video; you will be able to describe elements of the Ethernet frame.

86460
Spngn 1: Ethernet Limitations Dan Young

After watching this video; you will be able to describe limitations of Ethernet.

86475
Spngn 1: Ethernet Media Requirements Dan Young

After watching this video; you will be able to list Ethernet media requirements.

86464
Spngn 1: Ethernet On Layer 1 Dan Young

After watching this video; you will be able to describe Ethernet at Layer 1 of the OSI model.

86462
Spngn 1: Example Applying A Subnet Mask For A Class A Address Dan Young

After watching this video; you will be able to describe the impact of applying a subnet mask to a class A address.

86451
Spngn 1: Example Applying A Subnet Mask For A Class B Address Dan Young

After watching this video; you will be able to describe the impact of applying a subnet mask to a class B address.

86450
Spngn 1: Example Applying A Subnet Mask For A Class C Address Dan Young

After watching this video; you will be able to describe the impact of applying a subnet mask to a class C address.

86449
Spngn 1: Excessive Collisions Dan Young

After watching this video; you will be able to list causes of excessive collisions.

86540
Spngn 1: Excessive Noise Dan Young

After watching this video; you will be able to list causes of excessive noise.

86539
Spngn 1: External Configuration Sources Dan Young

After watching this video; you will be able to list external configuration sources for a router or switch.

86484
Spngn 1: Features Raymond Lacoste

After watching this video; you will be able to describe RIPng features.

86557
Spngn 1: Fiber Connector Types Dan Young

After watching this video; you will be able to identify fiber connector types.

86472
Spngn 1: Fiber Media Issues Dan Young

After watching this video; you will be able to troubleshoot issues on fiber media.

86537
Spngn 1: Fiber Types Dan Young

After watching this video; you will be able to describe different fiber media types.

86470
Spngn 1: Fiber-optic Materials Dan Young

After watching this video; you will be able to identify fiber-optic materials.

86469
Spngn 1: Finding Cisco Ios Image Dan Young

After watching this video; you will be able to describe how a device finds the IOS.

86498
Spngn 1: Flat Topologies Dan Young

After watching this video; you will be able to describe the characteristics of flat topologies.

86436
Spngn 1: Duplex Overview Dan Young

After watching this video; you will be able to compare full duplex and half duplex.

86513
Spngn 1: Dwdm Dan Young

After watching this video; you will be able to describe DWDM.

86474
Spngn 1: Dwdm And Roadm Dan Young

After watching this video; you will be able to describe and contrast SONET/SDH.

86607
Spngn 1: Dynamic Address Translation Example Dan Young

After watching this video; you will be able to describe the configuration of dynamic NAT.

86620
Spngn 1: E-business Challenge Dan Young

After watching this video; you will be able to describe security challenges for an E-Business.

86433
Spngn 1: Eight Easy Steps For Determining Subnet Addresses Dan Young

After watching this video; you will be able to describe Cisco’s 8-step IP subnetting technique.

86448
Spngn 1: Eigrp Authentication Raymond Lacoste

After watching this video; you will be able to configure authentication in EIGRP.

86567
Spngn 1: Eigrp Configuration Raymond Lacoste

After watching this video; you will be able to configure EIGRP.

86561
Spngn 1: Eigrp Load Balancing Raymond Lacoste

After watching this video; you will be able to describe EIGRP load-balancing capabilities.

86565
Spngn 1: Eliminating Routing Loops Raymond Lacoste

After watching this video; you will be able to describe how routing loops are avoided in routing protocols.

86551
Spngn 1: Enabling Management Interface Raymond Lacoste

After watching this video; you will be able to configure the management interface.

86666
Spngn 1: Enabling Ripng Raymond Lacoste

After watching this video; you will be able to configure RIPng.

86556
Spngn 1: Enabling Routing Protocol Raymond Lacoste

After watching this video; you will be able to enable a dynamic routing protocol.

86554
Spngn 1: Enabling Static Nat Address Mapping Example Dan Young

After watching this video; you will be able to configure static NAT.

86617
Spngn 1: Encapsulation And De-encapsulation Across A Network Dan Young

After watching this video; you will be able to identify where encapsulation and de-encapsulation occurs as a packet is transported across a network.

86386
Spngn 1: End-system Subnet Mask Operation Dan Young

After watching this video; you will be able to describe the role a subnet mask plays on a host.

86440
Spngn 1: Enhanced Editing Commands Dan Young

After watching this video; you will be able to use enhanced editing commands.

86488
Spngn 1: Establishing A Connection Dan Young

After watching this video; you will be able to describe the steps of TCP’s connection-oriented behavior.

86422
Spngn 1: Etherchannel Overview Dan Young

After watching this video; you will be able to describe EtherChannel.

86530
Spngn 1: Dsl Service Types Overview Dan Young

After watching this video; you will be able to list DSL service types and their characteristics.

86596
Spngn 1: Data De-encapsulation Dan Young

After watching this video; you will be able to describe data de-encapsulation.

86385
Spngn 1: Data Encapsulation

After watching this video; you will be able to describe data encapsulation.

86384
Spngn 1: Default Gateway Dan Young

After watching this video; you will be able to describe the role of the default gateway.

86441
Spngn 1: Default Spanning Tree Configuration Dan Young

After watching this video; you will be able to describe STP in its default state.

86528
Spngn 1: Definition Of A Network Dan Young

After watching this video; you will be able to describe aspects of a network.

86356
Spngn 1: Device Configuration Files Dan Young

After watching this video; you will be able to describe device configuration files.

86494
Spngn 1: Dhcp Client Configuration On Cisco Ios Software Dan Young

After watching this video; you will be able to configure an IOS router to be a DHCP client.

86628
Spngn 1: Dhcp Relay Configuration On Cisco Ios Software Dan Young

After watching this video; you will be able to configure DHCP Relay on an IOS router.

86627
Spngn 1: Dhcp Server Configuration On Cisco Ios Software Dan Young

After watching this video; you will be able to configure DHCP on an IOS router.

86626
Spngn 1: Dhcpv4 Relay Dan Young

After watching this video; you will be able to describe DHCPv4 Relay.

86624
Spngn 1: Dhcpv6 Dan Young

After watching this video; you will be able to describe DHCPv6.

86625
Spngn 1: Different Media Rates Dan Young

After watching this video; you will be able to describe Ethernet operation at different media rates.

86514
Spngn 1: Dmvpn Deployment Models Raymond Lacoste

After watching this video; you will be able to describe DMVPN deployment models.

86708
Spngn 1: Dns Tree Structure Dan Young

After watching this video; you will be able to describe the DNS tree structure.

86416
Spngn 1: Docsis Overview Dan Young

After watching this video; you will be able to describe DOCSIS.

86629
Spngn 1: Domain Name System Dan Young

After watching this video; you will be able to describe the Domain Name System.

86415
Spngn 1: Dsl Dan Young

After watching this video; you will be able to describe DSL.

86595
Spngn 1: Dsl Encapsulation Dan Young

After watching this video; you will be able to describe PPPoE and PPPoA when used for DSL encapsulation.

86637
Spngn 1: Dsl Forum Tr-101 Dan Young

After watching this video; you will be able to describe DSL Forum TR-101.

86604
Spngn 1: Counting To Infinity Raymond Lacoste

After watching this video; you will be able to describe the counting to infinity problem.

86548
Spngn 1: Configuring Ip Sla Dan Young

After watching this video; you will be able to configure IP SLA.

86688
Spngn 1: Configuring Network Devices Dan Young

After watching this video; you will be able to describe aspects of configuring network devices.

86491
Spngn 1: Configuring Ntp On Cisco Devices Dan Young

After watching this video; you will be able to configure NTP on a Cisco device.

86692
Spngn 1: Configuring Passwords And The Banner Dan Young

After watching this video; you will be able to configure passwords and the MOTD banner.

86506
Spngn 1: Configuring Port Security Dan Young

After watching this video; you will be able to configure port security.

86509
Spngn 1: Configuring Ppp And Authentication Dan Young

After watching this video; you will be able to configure PPP and CHAP.

86634
Spngn 1: Configuring Ppp And Authentication Overview Dan Young

After watching this video; you will be able to list the component commands of PPP and CHAP configuration.

86633
Spngn 1: Configuring Radius And Tacacs+ Raymond Lacoste

After watching this video; you will be able to configure RADIUS and TACACS+ for AAA.

86572
Spngn 1: Configuring Rapid Pvst+ On Cisco Me Switches Dan Young

After watching this video; you will be able to configure Rapid PVST+ on Cisco ME switches.

86529
Spngn 1: Configuring Snmp On Cisco Devices Dan Young

After watching this video; you will be able to configure basic SNMP settings on Cisco IOS XR.

86678
Spngn 1: Configuring Span On Cisco Switches Dan Young

After watching this video; you will be able to configure SPAN on a Cisco switch.

86684
Spngn 1: Configuring Syslog On Cisco Devices Dan Young

After watching this video; you will be able to configure Syslog on Cisco IOS and IOS XR.

86681
Spngn 1: Configuring The Switch Default Gateway Dan Young

After watching this video; you will be able to configure the switch default gateway.

86504
Spngn 1: Configuring The Switch Management Ip Address Dan Young

After watching this video; you will be able to configure the switch management IP address.

86503
Spngn 1: Configuring Users Dan Young

After watching this video; you will be able to configure users.

86697
Spngn 1: Connectivity Tests Raymond Lacoste

After watching this video; you will be able to test connectivity using IOS tools.

86576
Spngn 1: Connector Maintenance Dan Young

After watching this video; you will be able to describe challenges in fiber optic connector maintenance.

86473
Spngn 1: Context-sensitive Help Dan Young

After watching this video; you will be able to use CLI context-sensitive help.

86487
Spngn 1: Copper Ethernet Media Requirements Dan Young

After watching this video; you will be able to list requirements of copper Ethernet media.

86466
Spngn 1: Copper Media Issues Dan Young

After watching this video; you will be able to troubleshoot issues on copper media.

86536
Spngn 1: Closing A Connection Dan Young

After watching this video; you will be able to describe how TCP closes a connection.

86423
Spngn 1: Collecting Information With Cdp Dan Young

After watching this video; you will be able to use CDP to collect information.

86674
Spngn 1: Collision Domains And Broadcast Domains Dan Young

After watching this video; you will be able to describe and contrast collision and broadcast domains.

86476
Spngn 1: Commands And Shortcuts In The Cisco Command Prompt Raymond Lacoste

After watching this video; you will be able to use command shortcuts in Cisco IOS.

86660
Spngn 1: Common Network Attacks Dan Young

After watching this video; you will be able to identify common network attacks.

86427
Spngn 1: Common Physical Components Of A Network Dan Young

After watching this video; you will be able to identify physical networking components.

86357
Spngn 1: Comparison Of Spanning Tree Protocols Dan Young

After watching this video; you will be able to compare Spanning Tree Protocols.

86523
Spngn 1: Configuration Editing On A Cisco Ios Xr Router Raymond Lacoste

After watching this video; you will be able to use enhanced editing on Cisco IOS XR.

86661
Spngn 1: Configuration Issues Dan Young

After watching this video; you will be able to troubleshoot common Ethernet configuration issues.

86543
Spngn 1: Configure Authentication Using Local Database Dan Young

After watching this video; you will be able to configure local authentication.

86700
Spngn 1: Configuring A Gre Tunnel Raymond Lacoste

After watching this video; you will be able to configure a GRE tunnel.

86707
Spngn 1: Configuring A Router Password Raymond Lacoste

After watching this video; you will be able to configure passwords in Cisco IOS.

86569
Spngn 1: Configuring Aaa Dan Young

After watching this video; you will be able to configure AAA.

86698
Spngn 1: Configuring Aaa Authorization And Accounting Dan Young

After watching this video; you will be able to configure authorization and accounting.

86702
Spngn 1: Configuring And Verifying Dynamic Translation Dan Young

After watching this video; you will be able to configure and verify dynamic translation.

86619
Spngn 1: Configuring And Verifying Pat Dan Young

After watching this video; you will be able to configure and verify PAT.

86622
Spngn 1: Configuring And Verifying The Pos Interface Dan Young

After watching this video; you will be able to configure and verify the POS interface.

86642
Spngn 1: Configuring Device Identification Dan Young

After watching this video; you will be able to configure the hostname for a device.

86501
Spngn 1: Configuring Domain Name Dan Young

After watching this video; you will be able to configure the domain name for a device.

86502
Spngn 1: Configuring Etherchannel (part 1) Dan Young

After watching this video; you will be able to configure EtherChannel.

86531
Spngn 1: Ces And Tdmoip Dan Young

After watching this video; you will be able to describe DWDM and ROADM.

86608
Spngn 1: Cfm And E-lmi Dan Young

After watching this video; you will be able to define CFM and E-LMI.

86589
Spngn 1: Characteristics Of A Network Dan Young

After watching this video; you will be able to describe the characteristics of a network.

86366
Spngn 1: Choosing A Variance Value Raymond Lacoste

After watching this video; you will be able to configure a variance value for unequal load balancing in EIGRP.

86566
Spngn 1: Cia Triad Dan Young

After watching this video; you will be able to describe the components of the CIA Triad.

86431
Spngn 1: Cisco Discovery Protocol Dan Young

After watching this video; you will be able to describe Cisco Discovery Protocol.

86673
Spngn 1: Cisco Discovery Protocol Configuration Dan Young

After watching this video; you will be able to tune CDP configuration.

86675
Spngn 1: Cisco Hierarchical Network Model Dan Young

After watching this video; you will be able to describe the three layers of the Cisco Hierarchical Network Model.

86358
Spngn 1: Cisco Ios Command Line Modes Dan Young

After watching this video; you will be able to recognize the purpose and navigate between Cisco IOS command line modes.

86486
Spngn 1: Cisco Ios Copy Command Dan Young

After watching this video; you will be able to use the copy command.

86495
Spngn 1: Cisco Ios Xr Raymond Lacoste

After watching this video; you will be able to describe basics of Cisco IOS XR.

86656
Spngn 1: Cisco Ip Ngn Architecture Dan Young

After watching this video; you will be able to describe network management in the Cisco IP NGN architecture.

86672
Spngn 1: Cisco Ip Ngn Infrastructure Layer Dan Young

After watching this video; you will be able to describe the Cisco IP NGN Infrastructure Layer.

86365
Spngn 1: Cisco Ip Ngn Model Dan Young

After watching this video; you will be able to describe the Cisco IP NGN Model.

86359
Spngn 1: Cisco Ip Ngn User Applications Dan Young

After watching this video; you will be able to list Cisco IP NGN user applications.

86362
Spngn 1: Cisco Me 3400 Series Port Types Dan Young

After watching this video; you will be able to describe Cisco ME 3400 series port types.

86516
Spngn 1: Cisco Network Foundation Protection Dan Young

After watching this video; you will be able to describe Cisco Network Foundation Protection.

86432
Spngn 1: Classifying Routing Protocols Raymond Lacoste

After watching this video; you will be able to describe categories of routing protocols.

86654
Spngn 1: Cli Prompt Syntax Raymond Lacoste

After watching this video; you will be able to identify the CLI prompt.

86659
Spngn 1: Closed And Open Networks Dan Young

After watching this video; you will be able to compare closed and open networks.

86429
Spngn 1: 10/40/100 Gigabit Ethernet Dan Young

After watching this video; you will be able to list characteristics of 10;40; and 100 Gigabit Ethernet.

86610
Spngn 1: Aaa Model Dan Young

After watching this video; you will be able to describe AAA services.

86695
Spngn 1: Acquiring Addresses With Dhcp Dan Young

After watching this video; you will be able to describe how a host obtains an IP address via DHCP.

86623
Spngn 1: Adversaries; Adversary Motivations; And Classes Of Attack Dan Young

After watching this video; you will be able to compare adversaries; adversary motivations; and classes of attack.

86434
Spngn 1: An Overview Of Cisco Device Startup Dan Young

After watching this video; you will be able to describe major elements of Cisco device startup.

86497
Spngn 1: An Overview Of Ppp Dan Young

After watching this video; you will be able to describe PPP.

86630
Spngn 1: Anycast Ipv6 Addresses Dan Young

After watching this video; you will be able to describe anycast IPv6 addresses.

86405
Spngn 1: Apply Authentication To The Line Dan Young

After watching this video; you will be able to configure line authentication.

86699
Spngn 1: Applying The Subnet Address Scheme Dan Young

After watching this video; you will be able to applying IP subnetting.

86443
Spngn 1: Assigning Ipv6 Global Unicast Addresses Dan Young

After watching this video; you will be able to assign IPv6 global unicast addresses.

86409
Spngn 1: Atm Cell Relay Technology Dan Young

After watching this video; you will be able to describe ATM cell switching.

86593
Spngn 1: Autosummarization Raymond Lacoste

After watching this video; you will be able to describe the effects of autosummarization.

86562
Spngn 1: Benefits Of Vpns Dan Young

After watching this video; you will be able to list benefits of VPNs.

86644
Spngn 1: Bras And Bng Dan Young

After watching this video; you will be able to define BRAS and BNG.

86603
Spngn 1: Building A Cisco Ngn Infrastructure Raymond Lacoste

After watching this video; you will be able to recognize elements of the Cisco NGN infrastructure.

86647
Spngn 1: Bus Topology Dan Young

After watching this video; you will be able to identify and describe a bus topology.

86368
Spngn 1: Cable-based Wans Dan Young

After watching this video; you will be able to describe cable-based WANs.

86600
Spngn 1: Carrier Ethernet Attributes And Services Dan Young

After watching this video; you will be able to describe carrier Ethernet attributes and services.

86587
Spngn 1: Carrier Sense Multiple Access With Collision Detection (csma/cd) Dan Young

After watching this video; you will be able to describe Carrier Sense Multiple Access with Collision Detection (CSMA/CD).

86459
Spngn 1 – Ntp: Stratum Levels Concept Dan Young

After watching this video; you will be able to define NTP stratum levels.

86690
Sitcs 1.0: Sourcefire Ngips Benefits Overview Michael Shannon

In this video; Michael Shannon provides an overview of the benefits of Sourcefire next-generation IPS.

70229
Sitcs 1.0: Spam Quarantine Configuration

In this video; Michael Shannon explains ESA Spam Quarantine.

70214
Sitcs 1.0: Streaming Media Bandwidth Control Overview

In this video; Michael Shannon describes the controls offered by the Cisco Application Visibility and Control (AVC) over streaming media bandwidth in the Cisco Web Security Appliance (WSA).

70152
Sitcs 1.0: Tags; Ticket Ids; And Metadata Michael Shannon

In this video; Michael Shannon explains the purpose of using tags; ticket IDs; and metadata in a Cisco ASA Next-Generation Firewall.

70092
Sitcs 1.0: Trace Tool

In this video; Michael Shannon gives an overview of the Trace tool.

70224
Sitcs 1.0: Traditional Network Intrusion Prevention Systems Michael Shannon

In this video; Michael Shannon distinguishes between types of traditional network intrusion prevention systems.

70228
Sitcs 1.0: Traffic Redirection In Transparent Mode Michael Shannon

In this video; Michael Shannon describes the options for redirecting traffic in transparent mode on Cisco WSA.

70134
Sitcs 1.0: Traffic Redirection To Ips Module Overview Michael Shannon

In this video; Michael Shannon configures traffic redirection to a Cisco IPS module.

70239
Sitcs 1.0: Tune Cisco Ips To Reduce False Negatives Michael Shannon

In this video; Michael Shannon explains how to reduce false negatives in SITCS 1.0.

70255
Sitcs 1.0: Tune Cisco Ips To Reduce False Positives Michael Shannon

In this video; Michael Shannon discusses the ways in which you can reduce false positives in SITCS 1.0.

70253
Sitcs 1.0: Url Categorizing Process

In this video; Michael Shannon describes URL categorizing process for the Cisco Web Security Appliance (WSA).

70150
Sitcs 1.0: Url Category Reports

In this video; Michael Shannon describes URL Category Reports for the Cisco Web Security Appliance (WSA).

70155
Sitcs 1.0: Using The Policies Table

In this video; Michael Shannon describes the Policies Table for the Cisco Web Security Appliance (WSA).

70153
Sitcs 1.0: Validating Authentication

In this video; Michael Shannon describes validating authentication using Cisco Web Security Appliance (WSA).

70148
Sitcs 1.0: Verify Anomaly Detection Michael Shannon

In this video; Michael Shannon reviews how to verify anomaly detection in SITCS 1.0.

70264
Sitcs 1.0: Verify Global Correlation And Reputation Filter Michael Shannon

In this video; Michael Shannon discusses how to verify reputation risk rating in SITCS 1.0.

70269
Sitcs 1.0: Verifying Cisco Anyconnect Web Security Module Operations

In this video; Michael Shannon discusses ways to verify Cisco AnyConnect Web Security Module Operations.

70182
Sitcs 1.0: Verifying Cisco Asa Cloud Web Security Operations

In this video; Michael Shannon demonstrates verifying Cisco ASA cloud web security operations in SITCS 1.0.

70178
Sitcs 1.0: Verifying Wccp Michael Shannon

In this video; Michael Shannon explains the methods for verifying the operation of WCCP.

70136
Sitcs 1.0: Web Reputation Filtering Overview

In this video; Michael Shannon provides an overview of web reputation filtering in SITCS 1.0.

70160
Sitcs 1.0: Join Cisco Wsa To Active Directory

In this video; Michael Shannon describes how to join the Cisco Web Security Appliance (WSA) to an active directory for an NTLM realm.

70142
Sitcs 1.0: Ldap Authentication Realm And Server Configurations Michael Shannon

In this video; Michael Shannon demonstrates how to add a realm in Cisco ASA (CX).

70108
Sitcs 1.0: Mail Processing Overview

In this video; Michael Shannon explores the Incoming Mail Processing on this Cisco ESA.

70195
Sitcs 1.0: Message Tracking

In this video; Michael Shannon gives an overview of the Message Tracking tool.

70223
Sitcs 1.0: On-box And Off-box Cisco Prsm Michael Shannon

In this video; Michael Shannon describes the on-box and off-box Prime Security Manager (PRSM) for the Cisco Adaptive Security Appliance (ASA).

70074
Sitcs 1.0: Outbreak Filters Overview

In this video; Michael Shannon explains how Outbreak Filters work.

70219
Sitcs 1.0: Pac File Hosting On Cisco Wsa Michael Shannon

In this video; Michael Shannon explains how to configure the Cisco WSA to host PAC files.

70133
Sitcs 1.0: Pac Files Michael Shannon

In this video; Michael Shannon explains how to use PAC files to configure proxy information about a network.

70132
Sitcs 1.0: Policy Objects In Cisco Asa (cx) Ngfw Policies Michael Shannon

In this video; Michael Shannon highlights the different types of objects that can be used in Cisco ASA (CX) Next-Generation Firewall policies.

70090
Sitcs 1.0: Policy; Virus; Outbreak Quarantines Configuration

In this video; Michael Shannon explains how to configure other types of quarantines using the Policy; Virus; Outbreak Quarantines page.

70215
Sitcs 1.0: Reducing False Negatives Michael Shannon

In this video; Michael Shannon explains how to reduce false negatives in your environment in SITCS 1.0.

70256
Sitcs 1.0: Reducing False Positives Michael Shannon

In this video; Michael Shannon reviews how to reduce false positives in SITCS 1.0.

70254
Sitcs 1.0: Reporting Overview

In this video; Michael Shannon gives an overview of Cisco ESA reporting capabilities.

70222
Sitcs 1.0: Risk Rating Michael Shannon

In this video; Michael Shannon introduces Cisco risk rating.

70245
Sitcs 1.0: Risk Rating Calculation Michael Shannon

In this video; Michael Shannon introduces Cisco risk rating.

70246
Sitcs 1.0: Scancenter Web Filtering

In this video; Michael Shannon discusses how to enable HTTPS Inspection in the ScanCenter.

70188
Sitcs 1.0: Scancenter Web Filtering Policy Configuration

In this video; Michael Shannon demonstrates how to create and edit Web Filtering Policies in Cisco Cloud Web Security.

70187
Sitcs 1.0: Scancenter Web Filtering Policy Overview

In this video; Michael Shannon explains how web filtering policy is used in enterprises to inbound and outbound traffic.

70186
Sitcs 1.0: Scanners And Histograms Michael Shannon

In this video; Michael Shannon reviews how scanners and histograms work in SITCS 1.0.

70260
Sitcs 1.0: Smtp Overview

In this video; Michael Shannon gives an overview of SMTP.

70190
Sitcs 1.0: Deploy Sensors In Inline Vlan Group Mode Michael Shannon

In this video; Michael Shannon describes how to deploy Cisco sensors in inline VLAN group mode.

70236
Sitcs 1.0: Deploy Sensors In Inline Vlan Pair Mode Michael Shannon

In this video; Michael Shannon describes how to deploy Cisco sensors in inline VLAN pair mode.

70235
Sitcs 1.0: Deploy Sensors In Promiscuous Mode Michael Shannon

In this video; Michael Shannon explains how to deploy Cisco sensors in promiscuous mode.

70233
Sitcs 1.0: Dynamic Vectoring And Streaming Engine

In this video; Michael Shannon describes the Cisco Web Security Appliance (WSA) Dynamic Vectoring and Streaming Engine (DVS).

70157
Sitcs 1.0: Enable Web Reputation Filtering; Adaptive Scanning; And Malware Scanning

In this video; Michael Shannon demonstrates enabling Web Reputation Filtering; Adaptive Scanning; and Malware Scanning in SITCS 1.0.

70161
Sitcs 1.0: Event Action Filters Overview Michael Shannon

In this video; Michael Shannon uses Cisco IDM to configure an event action filter.

70249
Sitcs 1.0: Event Action Overrides Overview Michael Shannon

In this video; Michael Shannon provides an overview of Cisco event action overrides.

70247
Sitcs 1.0: Examine Ips Events Using Idm Michael Shannon

In this video; Michael Shannon discusses how to manage IPS events using the IPS device manager (IDM) in SITCS 1.0.

70250
Sitcs 1.0: False Positives And Negatives Michael Shannon

In this video; Michael Shannon explains false positives and negatives stepping through a range of false positives in SITCS 1.0.

70251
Sitcs 1.0: Global Correlation And Reputation Filter Michael Shannon

In this video; Michael Shannon discusses how Cisco global correlation and reputation filter works in SITCS 1.0.

70265
Sitcs 1.0: Global Correlation Configurations Michael Shannon

In this video; Michael Shannon details the steps involved in global correlation configurations in SITCS 1.0.

70268
Sitcs 1.0: Global Correlation Operations Michael Shannon

In this video; Michael Shannon discusses global correlation on Cisco IPS sensors in SITCS 1.0.

70266
Sitcs 1.0: Https Proxy

In this video; Michael Shannon provides an overview and demonstration of HTTPS proxy in SITCS 1.0.

70164
Sitcs 1.0: Intrusion Detection Systems Vs. Intrusion Prevention Systems Michael Shannon

In this video; Michael Shannon differentiates between intrusion detection systems and intrusion prevention systems.

70226
Sitcs 1.0: Intrusion Prevention Systems Terminologies Michael Shannon

In this video; Michael Shannon explains concepts associated with intrusion prevention systems.

70227
Sitcs 1.0: Invalid Destination Web Server Certificate Handling

In this video; Michael Shannon discusses invalid destination web server certificate handling in STICS 1.0.

70165
Sitcs 1.0: Ips Actions Michael Shannon

In this video; Michael Shannon discusses Cisco IPS actions in the inline and promiscuous modes.

70241
Sitcs 1.0: Ips Sensor Feedback To Cisco Sensorbase Michael Shannon

In this video; Michael Shannon explains how sensor feedback to Cisco SensorBase happens in SITCS 1.0.

70267
Sitcs 1.0: Ips Signatures Michael Shannon

In this video; Michael Shannon discusses Cisco IPS signatures.

70240
Sitcs 1.0: Ips Threat Profiles Overview Michael Shannon

In this video; Michael Shannon provides an overview of Cisco IPS threat profiles.

70243
Sitcs 1.0: Configure Inbound Web Reputation Filtering And Malware Scanning

In this video; Michael Shannon demonstrates configuring inbound web reputation filtering and malware scanning in SITCS 1.0.

70162
Sitcs 1.0: Configure Interfaces On Ips Sensor Michael Shannon

In this video; Michael Shannon uses Cisco IDM to configure interfaces on an IPS sensor.

70238
Sitcs 1.0: Configure Ldap Realm

In this video; Michael Shannon describes how to configure an LDAP realm in the Cisco Web Security Appliance (WSA).

70146
Sitcs 1.0: Configure Outbound Malware Scanning

In this video; Michael Shannon demonstrates configuring Outbound Malware Scanning in SITCS 1.0.

70163
Sitcs 1.0: Configure Policy Groups

In this video; Michael Shannon describes configuring policy groups for the Cisco Web Security Appliance (WSA).

70138
Sitcs 1.0: Configure Realms And Realm Sequences

In this video; Michael Shannon describes how to configure authentication realms and realm sequences for the Cisco Web Security Appliance (WSA).

70141
Sitcs 1.0: Configure Url Filtering

In this video; Michael Shannon describes how to configure URL Filtering in the Cisco Web Security Appliance (WSA).

70154
Sitcs 1.0: Configure Virtual Sensor Michael Shannon

In this video; Michael Shannon uses Cisco IDM to configure a virtual sensor.

70242
Sitcs 1.0: Configuring Avc

In this video; Michael Shannon describes how to configure the Cisco Application Visibility and Control (AVC) in the Cisco Web Security Appliance (WSA).

70156
Sitcs 1.0: Connecting The Cisco Wsa To A Wccp Router Michael Shannon

In this video; Michael Shannon explains how to connect a WSA to a WCCP router.

70135
Sitcs 1.0: Content Filters Configuration

In this video; Michael Shannon gives an overview of ESA Incoming and Outgoing Mail Content Filter configuration.

70218
Sitcs 1.0: Content Filters Overview

In this video; Michael Shannon explains Content Filters on the ESA.

70217
Sitcs 1.0: Contrast Webroot With Sophos Or Mcafee Malware Scanning

In this video; Michael Shannon describes the functionality of Webroot when used in conjunction with Sophos or McAfee Malware scanning in the Cisco Web Security Appliance (WSA) Dynamic Vectoring and Streaming Engine (DVS).

70158
Sitcs 1.0: Control Uploaded Content

In this video; Michael Shannon discusses features related to controlling uploaded content in SITCS 1.0.

70169
Sitcs 1.0: Custom Signature Wizard Michael Shannon

In this video; Michael Shannon reviews how to use the custom signature wizard in SITCS 1.0.

70258
Sitcs 1.0: Custom Signatures Michael Shannon

In this video; Michael Shannon reviews customer signatures; how they work; and the methods used to create them in SITCS 1.0.

70257
Sitcs 1.0: Data Loss Prevention Configuration

In this video; Michael Shannon gives an overview of how to enabling the DLP feature.

70221
Sitcs 1.0: Data Loss Prevention Overview

In this video; Michael Shannon explains the data loss prevention outgoing mail policy features.

70220
Sitcs 1.0: Data Security Policies

In this video; Michael Shannon provides an overview of Data Security policies in SITCS 1.0.

70168
Sitcs 1.0: Deploy Sensors In Inline Interface Pair Mode Michael Shannon

In this video; Michael Shannon explains how to deploy Cisco sensors in inline interface pair mode.

70234
Sitcs 1.0: Cisco Web-based Reputation Score Michael Shannon

In this video; Michael Shannon describes how the Cisco Web-Based Reputation Score helps mitigate against malware.

70124
Sitcs 1.0: Cisco Wsa Acceptable Use Policy Enforcement Michael Shannon

In this video; Michael Shannon describes how Cisco WSA acceptable use policy is enforced.

70125
Sitcs 1.0: Cisco Wsa Cloud Web Security Overview

In this video; Michael Shannon gives an overview of the Cisco WSA Cloud Web Security.

70185
Sitcs 1.0: Cisco Wsa Data Security Overview

In this video; Michael Shannon provides an overview of Cisco WSA data security in SITCS 1.0.

70167
Sitcs 1.0: Cisco Wsa Gui Management Michael Shannon

In this video; Michael Shannon explains the management features on the Cisco Web Security Appliance GUI.

70126
Sitcs 1.0: Cisco Wsa Identity Michael Shannon

In this video; Michael Shannon demonstrates how to configure identities on the Cisco Web Security Appliance.

70128
Sitcs 1.0: Cisco Wsa Overview Michael Shannon

In this video; Michael Shannon describes the features of the Cisco Web Security Appliance.

70123
Sitcs 1.0: Cisco Wsa Policy Assignment Using Identity Michael Shannon

In this video; Michael Shannon explains how policies can be assigned in Cisco WSA by using identity as a policy group membership requirement.

70129
Sitcs 1.0: Cisco Wsa Policy Trace Tool Michael Shannon

In this video; Michael Shannon describes the role of the Cisco WSA Policy Trace tool in troubleshooting transactions.

70130
Sitcs 1.0: Cisco Wsa Policy Types Michael Shannon

In this video; Michael Shannon describes Cisco WSA policy types.

70127
Sitcs 1.0: Compatibility With Existing Cisco Asa Features Michael Shannon

In this video; Michael Shannon describes the compatibility of the Cisco Adaptive Security Appliance (ASA CX) Next-Generation Firewall (NGFW) with existing Cisco ASA features.

70071
Sitcs 1.0: Configure An Identity To Require Authentication (basic Or Ntlmssp)

In this video; Michael Shannon describes how to configure an identity to require authentication using the basic or NTLMSSP scheme in the Cisco Web Security Appliance (WSA).

70144
Sitcs 1.0: Configure An Identity To Require Transparent User Identification

In this video; Michael Shannon describes how to configure an identity to require transparent user authentication using the NTLM scheme in the Cisco Web Security Appliance (WSA).

70145
Sitcs 1.0: Configure And Verify Event Action Overrides Michael Shannon

In this video; Michael Shannon uses Cisco IDM to configure event action overrides.

70248
Sitcs 1.0: Configure Basic Signature Properties Michael Shannon

In this video; Michael Shannon uses Cisco IDM to configure basic signature properties.

70244
Sitcs 1.0: Configure Cisco Anyconnect Web Security Module For Standalone Use

In this video; Michael Shannon provides a step-by-step overview of configuring the Cisco AnyConnect Web Security module for standalone use in SITCS 1.0.

70180
Sitcs 1.0: Configure Cisco Asa To Download The Web Security Module To The Client Machine

In this video; Michael Shannon provides a step-by-step overview of configuring the Cisco ASA to download the Web Security Module on a client machine in SITCS 1.0.

70181
Sitcs 1.0: Configure Decryption Policies

In this video; Michael Shannon demonstrates configuring Decryption Policies in SITCS 1.0.

70166
Sitcs 1.0: Configure Global Authentication Settings

In this video; Michael Shannon describes how to configure Global Authentication Settings with the Cisco Web Security Appliance (WSA).

70143
Sitcs 1.0: Configure Identities To Group Client Transactions Michael Shannon

In this video; Michael Shannon explains how to configure identities to group client transactions in Cisco WSA.

70137
Sitcs 1.0: Cisco Esa Listener Overview

In this video; Michael Shannon explores Cisco Email Security Appliance Listener; and by definition; a listener on the ESA is an SMTP daemon.

70198
Sitcs 1.0: Cisco Esa Mail Policies Matching

In this video; Michael Shannon explains how the ESA matches Mail Policies.

70212
Sitcs 1.0: Cisco Esa Services Overview

In this video; Michael Shannon gives an overview of Cisco Email Security Appliance services.

70192
Sitcs 1.0: Cisco Hybrid Email Security Solution

In this video; Michael Shannon explains the Cisco Hybrid Email Security Solution.

70097
Sitcs 1.0: Cisco Ips Management Options Overview Michael Shannon

In this video; Michael Shannon provides an overview of Cisco IPS management options in the IDM.

70237
Sitcs 1.0: Cisco Ips Sensor Deployment Modes Overview Michael Shannon

In this video; Michael Shannon discusses Cisco IPS sensor deployment modes.

70232
Sitcs 1.0: Cisco Ips Tuning Approaches Michael Shannon

It’s essential to plan your tuning approach. In this video; Michael Shannon explains how perfect tuning is impossible but that there are strategies to protect your environment from false positives in SITCS 1.0.

70252
Sitcs 1.0: Cisco Isr G2 Cloud Web Security Configuration

In this video; Michael Shannon provides an overview of how to configure CWS connector on an ISR G2.

70184
Sitcs 1.0: Cisco Isr G2 Cloud Web Security Overview

In this video; Michael Shannon gives an overview of Cisco CWS Security Connectors on the integrated Services Router and ISR Generation 2 Router.

70183
Sitcs 1.0: Cisco Modular Network Architecture And Cisco (cx) Ngfw Services Michael Shannon

In this video; Michael Shannon describes the Cisco Modular Network Architecture and Cisco Adaptive Security Appliance (ASA) CX Next-Generation Firewall (NGFW) Services.

70067
Sitcs 1.0: Cisco Modular Network Architecture And Cisco Cloud Web Security

In this video; Michael Shannon discusses Cisco Modular Network Architecture and Cisco Cloud Web Security for SITCS 1.0.

70170
Sitcs 1.0: Cisco Modular Network Architecture And Cisco Esa

In this video; Michael Shannon discusses how to place the ESA into a modular network design.

70189
Sitcs 1.0: Cisco Modular Network Architecture And Cisco Ips Michael Shannon

In this video; Michael Shannon discusses placement of the Cisco IPS into a typical modular network design.

70225
Sitcs 1.0: Cisco Modular Network Architecture And Cisco Wsa Michael Shannon

In this video; Michael Shannon explains the function of the Web Security Appliance and its place in the Cisco Modular Network Architecture.

70122
Sitcs 1.0: Cisco Prsm And Ngfw License Management Michael Shannon

In this video; Michael Shannon describes licensing for the Prime Security Manager (PRSM) and Next-Generation Firewall (NGFW) on the Cisco Adaptive Security Appliance (ASA) CX.

70080
Sitcs 1.0: Cisco Prsm Dashboards And Reports Michael Shannon

In this video; Michael Shannon demonstrates how to use dashboards and reports in Cisco Prime Security Manager.

70093
Sitcs 1.0: Cisco Prsm Event Viewer Michael Shannon

In this video; Michael Shannon demonstrates how to use the Event Viewer in Cisco Prime Security Manager.

70094
Sitcs 1.0: Cisco Prsm Gui Basic Functions Michael Shannon

In this video; Michael Shannon describes the basic Graphical User Interface (GUI) functions for the Cisco Adaptive Security Appliance (ASA) Prime Security Manager (PRSM).

70075
Sitcs 1.0: Cisco Registered Envelope Service (cres) Overview

In this video; Michael Shannon provides an overview of the Cisco Registered Envelope Service.

70197
Sitcs 1.0: Cisco Sio Update Verifications Michael Shannon

In this video; Michael Shannon explains how to use CISCO Security Intelligence Operations updates.

70095
Sitcs 1.0: Cisco Asa (cx) Ngfw Service Objects And Service Groups Michael Shannon

In this video; Michael Shannon describes the purpose of Cisco ASA Next-Generation Firewall service objects and groups.

70085
Sitcs 1.0: Cisco Asa (cx) Ngfw Source Object And Destination Object Groups Michael Shannon

In this video; Michael Shannon describes the properties of Cisco ASA (CX) Next-Generation Firewall source object groups and destination object groups.

70088
Sitcs 1.0: Cisco Asa (cx) Ngfw Url Filtering Configuration Michael Shannon

In this video; Michael Shannon discusses how to configure NG Firewall URL filtering.

70100
Sitcs 1.0: Cisco Asa (cx) Ngfw Url; User Agent; And Identity Objects Michael Shannon

In this video; Michael Shannon explores the properties of Cisco ASA (CX) Next-Generation Firewall objects.

70087
Sitcs 1.0: Cisco Asa (cx) Ngfw-to-cisco Cda Integration Configurations Michael Shannon

In this video; Michael Shannon demonstrates NG Firewall-to-Cisco CDA Integration Configuration in System Center 2012 R2.

70110
Sitcs 1.0: Cisco Asa Cloud Web Security Basic Configuration Using Asdm

In this video; Michael Shannon demonstrates Cisco ASA cloud web security basic configuration using ASDM in SITCS 1.0.

70175
Sitcs 1.0: Cisco Asa Cloud Web Security Basic Configuration Using The Cli

In this video; Michael Shannon demonstrates configuring Cisco ASA cloud web security using the CLI in SITCS 1.0.

70176
Sitcs 1.0: Cisco Asa Cloud Web Security Config With Whitelist And Identity Options Using The Cli

In this video; Michael Shannon demonstrates Cisco cloud web security configuration with whitelist and identity option using the command line interface in SITCS 1.0.

70177
Sitcs 1.0: Cisco Asa Cloud Web Security Overview

In this video; Michael Shannon provides an overview of Cisco ASA cloud web security in SITCS 1.0.

70174
Sitcs 1.0: Cisco Asa Cx Hardware Modules Michael Shannon

In this video; Michael Shannon describes the Cisco Adaptive Security Appliance (ASA) hardware modules.

70072
Sitcs 1.0: Cisco Asa Cx-ssp Hardware Module Management Interfaces Michael Shannon

In this video; Michael Shannon describes dedicated management interfaces for the Cisco Adaptive Security Appliance (ASA) CX-SSP.

70077
Sitcs 1.0: Cisco Cloud Web Security

In this video; Michael Shannon provides a demonstration of Cisco Cloud Web Security in SITCS 1.0.

70172
Sitcs 1.0: Cisco Cloud Web Security Authentication Key And Traffic Redirection

In this video; Michael Shannon discusses Cisco Cloud Web Security authentication key and traffic redirection in SITCS 1.0.

70173
Sitcs 1.0: Cisco Cloud Web Security Overview

In this video; Michael Shannon provides an overview of Cisco Cloud Web Security in SITCS 1.0.

70171
Sitcs 1.0: Cisco Esa Deployment Scenarios

In this video; Michael Shannon presents an overview of Cisco E-mail ESA Listener.

70199
Sitcs 1.0: Cisco Esa Gui Management

In this video; Michael Shannon gives an overview of ESA Graphical User Interface Management.

70193
Sitcs 1.0: Cisco Esa Incoming And Outgoing Mail Policies Overview

In this video; Michael Shannon provides an overview of the ESA Incoming and Outgoing Mail Policy configuration.

70211
Sitcs 1.0: Cisco Esa Ldap Integration

In this video; Michael Shannon gives an overview of the Cisco Registered Envelope Service.

70196
Sitcs 1.0: Cisco Esa Licensing

In this video; Michael Shannon explains Cisco ESA licensing requirements.

70194
Sitcs 1.0: Cisco Asa (cx) Ngfw Secure Mobility Objects Michael Shannon

In this video; Michael Shannon explains the purpose and properties of Next-Generation Firewall secure mobility objects and action profiles in Cisco ASA (CX).

70089
Sitcs 1.0: Cisco Asa (cx) Ngfw Application Objects And Application Service Objects Michael Shannon

In this video; Michael Shannon describes Next-Generation Firewall (NGFW) application objects and application service objects for the Cisco Adaptive Security Appliance (ASA) CX.

70086
Sitcs 1.0: Cisco Asa (cx) Ngfw Authentication Settings Configuration Michael Shannon

In this video; Michael Shannon explores Cisco ASA (CX) NGFW Authentication.

70112
Sitcs 1.0: Cisco Asa (cx) Ngfw Benefits And Components Michael Shannon

In this video; Michael Shannon describes the benefits and components of the Cisco Adaptive Security Appliance (ASA) CX Next-Generation Firewall (NGFW) Services.

70068
Sitcs 1.0: Cisco Asa (cx) Ngfw Broad And Web Avc Michael Shannon

In this video; Michael Shannon describes the Cisco Adaptive Security Appliance (ASA) CX Next-Generation Firewall (NGFW) Broad and Web Application; Visibility; and Control (AVC) services.

70069
Sitcs 1.0: Cisco Asa (cx) Ngfw Certificates Michael Shannon

In this video; Michael Shannon explores how to work with Cisco ASA (CX) Next-Generation Firewall certificates.

70118
Sitcs 1.0: Cisco Asa (cx) Ngfw Cli Operations Michael Shannon

In this video; Michael Shannon describes the Command Line Interface (CLI) Operations for the Cisco Adaptive Security Appliance (ASA) CX Next-Generation Firewall (NGFW).

70078
Sitcs 1.0: Cisco Asa (cx) Ngfw Decryption Flow Michael Shannon

In this video; Michael Shannon describes the Cisco ASA (CX) Next-Generation Firewall decryption flow.

70116
Sitcs 1.0: Cisco Asa (cx) Ngfw Decryption Policies Michael Shannon

In this video; Michael Shannon discusses characteristics of Cisco ASA (CX) Next-Generation Firewall decryption policies.

70115
Sitcs 1.0: Cisco Asa (cx) Ngfw Decryption Policy Configuration Michael Shannon

In this video; Michael Shannon explains how to configure a Cisco ASA (CX) Next-Generation Firewall decryption policy to match security requirements.

70119
Sitcs 1.0: Cisco Asa (cx) Ngfw File Filtering Profile Configuration Michael Shannon

In this video; Michael Shannon explores the process used to configure a file filtering profile and apply it to an access policy.

70101
Sitcs 1.0: Cisco Asa (cx) Ngfw Identity Policies Michael Shannon

In this video; Michael Shannon explores Cisco ASA (CX) NGFW identity policies in System Center 2012 R2.

70111
Sitcs 1.0: Cisco Asa (cx) Ngfw Identity; Decryption; And Access Policy Interactions Michael Shannon

In this video; Michael Shannon describes how Cisco ASA (CX) Next-Generation Firewall identity; decryption; and access policies interact with each other.

70121
Sitcs 1.0: Cisco Asa (cx) Ngfw Identity-based Policy Configuration Michael Shannon

In this video; Michael Shannon discusses the Next-Generation Firewall (NGFW) authentication realms in Cisco ASA (CX).

70107
Sitcs 1.0: Cisco Asa (cx) Ngfw Licenses Michael Shannon

In this video; Michael Shannon describes Next-Generation Firewall (NGFW) licenses for the Cisco Adaptive Security Appliance (ASA) CX.

70079
Sitcs 1.0: Cisco Asa (cx) Ngfw Management Architecture Michael Shannon

In this video; Michael Shannon describes the Cisco Adaptive Security Appliance (ASA) Next-Generation Firewall (NGFW) management architecture.

70073
Sitcs 1.0: Cisco Asa (cx) Ngfw Management Interface Michael Shannon

In this video; Michael Shannon describes the Next-Generation Firewall (NGFW) Management Interface for the Cisco Adaptive Security Appliance (ASA) CX.

70076
Sitcs 1.0: Cisco Asa (cx) Ngfw Network Objects Michael Shannon

In this video; Michael Shannon explains the purpose of Cisco ASA Next-Generation Firewall network objects.

70084
Sitcs 1.0: Cisco Asa (cx) Ngfw Policy Object Types Michael Shannon

In this video; Michael Shannon demonstrates how to work with Cisco ASA Next-Generation Firewall policy object types.

70083
Sitcs 1.0: Cisco Asa (cx) Ngfw Policy Structure Michael Shannon

In this video; Michael Shannon describes the Cisco ASA Next-Generation Firewall policy structure.

70082
Sitcs 1.0: Cisco Asa (cx) Ngfw Policy Types Michael Shannon

In this video; Michael Shannon describes Cisco Adaptive Security Appliance (ASA) CX Next-Generation Firewall (NGFW) Policy Types.

70070
Sitcs 1.0: Anti-virus Overview

In this video; Michael Shannon gives an overview of Anti-Virus Filtering.

70216
Sitcs 1.0: Application And Service Field Matching Options Michael Shannon

In this video; Michael Shannon highlights the matching options in the application and service fields available in the Next-Generation Firewall policies in Cisco ASA.

70091
Sitcs 1.0: Application Visibility And Control Overview

In this video; Michael Shannon describes the Application Visibility and Control (AVC) for the Cisco Web Security Appliance (WSA).

70151
Sitcs 1.0: Apply Ngips Threat Profile In Ngfw Services Access Policy Michael Shannon

In this video; Michael Shannon explains how to apply a Cisco NGIPS threat profile in an NGFW services access policy.

70231
Sitcs 1.0: Asa (cx) Web Reputation Profile Configuration Michael Shannon

In this video; Michael Shannon explores the process used to configure a web reputation profile and apply it to an access policy.

70102
Sitcs 1.0: Asa Ngfw Services With Ngips Michael Shannon

In this video; Michael Shannon explains the next-generation IPS feature as implemented in the Cisco next-neneration Firewall.

70230
Sitcs 1.0: Asa-to-cisco Asa (cx) Ngfw Traffic Redirection Michael Shannon

In this video; Michael Shannon describes traffic redirection from the Cisco ASA to the ASA (CX) Next-Generation Firewall.

70081
Sitcs 1.0: Authentication Protocols And Schemes

In this video; Michael Shannon describes user authentication protocols and schemes for the Cisco Web Security Appliance (WSA).

70139
Sitcs 1.0: Basic Authentication In Explicit Proxy And Transparent Mode

In this video; Michael Shannon describes basic authentication in explicit proxy and transparent proxy mode for the Cisco Web Security Appliance (WSA).

70140
Sitcs 1.0: Cisco Anyconnect Web Security Module

In this video; Michael Shannon provides an overview of the Cisco AnyConnect Web Security module in SITCS 1.0.

70179
Sitcs 1.0: Cisco Asa (cx) Access Policies Troubleshooting Michael Shannon

Certain tools in the Cisco PRSM allow you to monitor and troubleshoot your access policies. In this video; Michael Shannon provides a description of these tools.

70103
Sitcs 1.0: Cisco Asa (cx) Decryption-policy Troubleshooting Michael Shannon

In this video; Michael Shannon explains common troubleshooting issues with Cisco ASA CX decryption policies.

70120
Sitcs 1.0: Cisco Asa (cx) Identity Policy Troubleshooting Michael Shannon

In this video; Michael Shannon explains the tools used for monitoring and troubleshooting Cisco ASA (CX) identity policies.

70114
Sitcs 1.0: Cisco Asa (cx) Ngfw Access And Decryption Policies With Identity Objects Michael Shannon

In this video; Michael Shannon describes how identity objects work in Cisco ASA (CX) Next-Generation Firewall access and decryption policies.

70113
Sitcs 1.0: Cisco Asa (cx) Ngfw Access Policy Configuration Michael Shannon

In this video; Michael Shannon shows how to configure a Cisco ASA (CX) Next-Generation Firewall access policy.

70096
Sitcs 1.0: Cisco Asa (cx) Ngfw Active And Passive Authentications Michael Shannon

Cisco ASA (CX) NGFW can use two different methods to obtain user identification information. In this video; Michael Shannon explains these two methods.

70104
Sitcs 1.0: Cisco Asa (cx) Ngfw Active Authentication Michael Shannon

In active authentication the user initiates an HTTP or HTTPS only connection to trigger the authentication process. In this video; Michael Shannon walks through the steps involved with the Cisco ASA (CX); or Cisco ASA (CX) Next-Generation Firewall; active authentication process.

70106
Sitcs 1.0: Cisco Asa (cx) Ngfw Application Control Configuration Michael Shannon

In this video; Michael Shannon explores ASA NG application control configuration.

70098
Sitcs 1.0: Cisco Asa (cx) Ngfw Application Control Configuration (cont.) Michael Shannon

Applying deeper controls over different application types is possible in ASA NG through the use of its Web AVC engine. In this video; Michael Shannon continues his exploration of ASA NG application control configuration; focusing on the Web AVC engine.

70099
Sitcs 1.0: Anti-spam Configuration

In this video; Michael Shannon explains Anti-Spam Filtering on the ESA.

70213
Simos 1.0: Vpn Types Michael Shannon

After watching this video; you will be able to describe clientless and client-based AnyConnect VPNs.

77923
Sitcs 1.0 – Cisco Esa Deployment Scenario: Hat Overview

In this video; Michael Shannon explains Cisco ESA HAT.

70202
Sitcs 1.0 – One Listener Deployment Scenario: Email Relaying On Internal Mail Server

In this video; Michael Shannon explains how to configure an e-mail relay on internal mail servers.

70210
Sitcs 1.0 – One Listener Deployment Scenario: Hat > Add Sender Group

In this video; Michael Shannon explains how to add a Sender Group.

70204
Sitcs 1.0 – One Listener Deployment Scenario: Hat > Mail Flow Policies Summary

In this video; Michael Shannon gives an overview of mail flow policies.

70207
Sitcs 1.0 – One Listener Deployment Scenario: Hat > Mail Flow Policy

In this video; Michael Shannon explains the Cisco ESA Mail Flow Policy.

70205
Sitcs 1.0 – One Listener Deployment Scenario: Hat > Mail Flow Policy > Anti-spam And Anti-virus

In this video; Michael Shannon explains Cisco ESA mail flow policy anti-spam and anti-virus settings.

70206
Sitcs 1.0 – One Listener Deployment Scenario: Hat > Sender Group

In this video; Michael Shannon gives an overview of the different Sender Group types.

70203
Sitcs 1.0 – One Listener Deployment Scenario: Interfaces And Listener

In this video; Michael Shannon discusses how to set an IP address on an interface and how to create a listener on the ESA.

70200
Sitcs 1.0 – One Listener Deployment Scenario: Ldap Accept Query

In this video; Michael Shannon prese