•••• SWITCHING :
••• Global Objectives :
• Introduction
• Basic Configuration
• Host Table
• MAC Table
• ARP Table
• VLAN Introduction
• VLAN Configuration
• Trunking & DTP
• VTP
• STP
• RSTP
• STP Tuning
• Etherchannel
••• Recall : See the Picture
••• Switching Introduction :
•• What is a Switch ?
• Layer 2 device
• Used to connect the end users between them (PC, PRINTER, IP PHONE, CAMERA,
SERVER, ...) on the same network
• Intelligent device : Can understand MAC addresses to identify which the source
and the destination
•• The switch characteristics :
• Port number : 4 -> 256
• Plateforme : 2900, 3500, 3700, 3800, 4200, 4500, 5000, 6200, 7000, 9000, ...
• Series : 2950, 2960, 2960S, 2960X, 3725, 3745, ...
• Hardware version : V1, V2 and V3
• Port Types :
- Ethernet : 10 MB
- FastEthernet : 100 MB
- GigabitEthernet : 1 GB
- 10 GigabitEthernet : 10 GB
• Switching Type : Store and Forward, Cut Through, ...
•• Switching Type (Frame Transfer Mode) :
• Store & Forward : The switch excepts to have the entire frame before starting
transmission. This type offers the full time to check errors (FCS = Frame Check
Sequence), but there are a big problem (LATENCY).
• Cut Through :
- Fast Forward : As soon as the destination is known, the switch start the
transmission.
- Fragment Free : The switch excepts to have the first 64 bytes before starting
transmission (To avoid the collision fragment (<64Bytes)).
•• Switch Form Factor :
• Fixe : See the picture 2
• Fixe : See the picture 3
• Fixe : See the picture 4
••• Network Architectures : See the Picture 5
• Internet Routers (A) :
- Allows to connect the LAN networks with the Internet
- Technologies : Routing + NAT + WAN Technology (PPP, PPPoE, PPPoA, MPLS, VPLS, ME,
...).
• Internet Firewalls - Frontal (B) :
- Secure the internal networks against the external attacks.
- Technologies : Routing + POLICIES + HA + NAT + VPN (IPSEC) + HA + SDWAN
• Internet Firewalls - Dorsal (C) :
- Strengthening Security.
- Technologies : Routing + POLICIES + HA + SECURITY PROFILES + HA + CAPTIVE PORTAL
+ IVR
• Core (D) :
- It's the most important device in the network. Must transfer data as quickly as
possible, and provides the connection to the internet or other companies via MAN or
WAN.
- Technologies : IVR + STP ROOT + ROUTING
• Distribution (E) :
- Allows to limit the broadcast areas, and centralize the access switches
administration.
- Technologies : IVR + ACL + VLAN + TRUNKING + VTP + STP + Infrastructure Services
(DHCP, NTP).
• Access (F) :
- Connect the end users (PC, IP Phone, Printer, ...).
- Technologies : Trunk + Access + basic security (Port Security).
• Internal DMZ :
- Contains servers accessible from the LAN.
• External DMZ :
- Contains servers accessible from the WAN.
••• Switch Components : See the Picture 6
••• Switch Starting :
• 1 - The ROM (Read Only Memory) execute the POST (Power On Self Test).
• 2 - The ROM execute the BOOTLOADER (Little Program in the ROM Memory).
• 3 - CPU (Central Processing Unit) and FLASH Memory initialisation (By
BOOTLOADER).
• 4 - The BOOTLOADER decompress and load IOS (Internetwork Operating System) from
FLASH to the RAM (Random Access Memeory)
• 5 - The BOOTLOADER load files system (VLAN.DAT & CONFIG.TEXT) from FLASH to the
RAM.
• 6 - Start the Switch.
••• Basic Configuration keys :
- Clock (Date & Time)
- Hostname
- Domain Name
- Server Name
- DNS Resolving
- Banner
- IP Addressing (Management)
- Gateway
- Access Security (Exec & Console)
- Remote Access (Telnet)
- Web Interfaces (HTTP)
- Saving (NVRAM, TFTP)
- ...
••• Next LAB : See the Picture 7