Information and Network Technology Ben Eckart Revised Date 07/26/2012 Implementation Date 08/01/2012 COURSE OUTLINE CRT 286 LAN/WAN Implementation and Support 3 Credit Hours Course Description The focus of this course is on LAN switching, wireless LANs and accessing wide area networks (WAN). The goal is to develop an understanding of how a switch communicates with other switches and routers in a small- or medium-sized business network to implement VLAN segmentation and to develop an understanding of various WAN technologies to connect small- to medium sized business networks. This course also teaches how to integrate wireless devices into a LAN. Prerequisite(s) CRT 175 with a grade of C or higher. Purpose of Course This course provides a comprehensive, theoretical, and practical approach to learning the technologies and protocols needed to design and implement a converged switched network. Students learn about the hierarchical network design model and how to select devices for each layer. The course explains how to configure a switch for basic functionality and how to implement Virtual LANs, VTP, STP and Inter-VLAN routing in a converged network. The different implementations of Spanning Tree Protocol in a converged network are presented, and students develop the knowledge and skills necessary to implement a WLAN in a small-tomedium network. This course also discusses the WAN technologies and network services required by converged applications in enterprise networks. The course uses the Cisco Network Architecture to introduce integrated network services and explains how to select the appropriate devices and technologies to meet network requirements. Students learn how to implement and configure common data link protocols and how to apply WAN security concepts, principles of traffic, access control, and addressing services. Finally, students learn how to detect, troubleshoot, and correct common enterprise network implementation issues. This is the third course and fourth course in Cisco Network Academy Program Required Materials Lab book(s): Other: Optional Materials Textbook(s): LAN Switching and Wireless, CCNA Exploration Labs and Study Guide, Cisco Press (ISBN-10: 1-58713-2028 / ISBN 13: 978-1-58713-202-5) Accessing the WAN CCNA Exploration Labs and Study Guide, Cisco Press (ISBN 1-587-13201-X)( ISBN-13: 978-1-58713-201-8) Required INT laptop computer as noted in Laptop Specification document. Residential internet access LAN Switching and Wireless, CCNA Exploration Companion Guide, Cisco Press (ISBN-10: 1-58713-207-9; ISBN-13: 978-1-58713-207-0) Accessing the WAN CCNA Exploration Companion Guide, Cisco Press (ISBN 1-587-13205-2) (ISBN-13: 978-158713-205-6)
Learning Outcomes The intention is for the student to be able to 1. Understand advanced IP addressing techniques. 2. Interpret network diagrams 3. Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts 4. Explain the technology and media access control method for Ethernet networks 5. Explain basic switching concepts and the operation of switches 6. Perform and verify initial switch configuration tasks 7. Describe enhanced switching technologies. 8. Describe how VLANs create logically separate networks 9. Configure, verify, and troubleshoot VLANs, trunking on switches, intervlan routing, VTP, and RSTP 10. Understand and implement intermediate routing protocols. 11. Understand and implement route redistribution. 12. Work as a team to solve a complex routing problem. 13. Verify the operational status of a Cisco switched network 14. Verify network status and switch operation 15. Identify, prescribe, and resolve common switched network issues 16. Manage Cisco los Software 17. Manage Cisco los configuration files 18. Describe standards associated with wireless media 19. Identify and describe the purpose of the components in a wireless network 20. Identify basic configuration parameters on a wireless network to ensure that devices connect to the correct access points 21. Compare and contrast Wi-Fi Protected Access (WPA) security features and capabilities of open, Wired Equivalent Privacy (WEP), and WPA-1/2 networks 22. Describe common wireless-network implementation issues 23. Describe the impact of Voice Over IP and Video Over IP applications on a network. 24. Identify and correct common network problems at layers 1, 2, 3, and 7 using a layered model approach. 25. Describe the components required for network and Internet communications 26. Implement basic switch security measures such as port security, trunk access, and management VLANs 27. Explain the operation and benefits of DHCP and DNS 28. Configure, verify, and troubleshoot DHCP and DNS operations on a router 29. Describe current network security threats and explain how to implement a comprehensive security policy to mitigate common threats to network devices, hosts, and applications 30. Describe the functions of common security appliances and applications 31. Describe recommended security practices to secure network devices 32. Describe the purpose and types of access control lists (ACLs) 33. Configure and apply ACLs based on network filtering requirements 34. Configure and apply an ACLs to limit Telnet and SSH access to the router using the Security Device Manager command-line interface (SDM/CLI) 35. Verify, monitor, and troubleshoot ACLs in a network environment 36. Explain the basic operation of Network Address Translation (NAT) 37. Configure NAT for given network requirements using SDM/CLI
38. Troubleshoot NAT issues 39. Describe different methods for connecting to a WAN 40. Configure and verify a basic WAN serial connection 41. Configure and verify a Point-to-Point Protocol (PPP) connection between Cisco routers 42. Configure and verify Frame Relay on Cisco routers 43. Troubleshoot WAN implementation issues 44. Describe the importance, benefits, role, impact, and components of VPN technology 45. Describe converged voice and data networks as well as the challenges faced by various technologies Course Competencies Actions that are essential to achieve the learning outcomes: 1. Describe the purpose of the OSI model and each of its layers and explain how the TCP/IP protocols correlate to layers of the OSI model. 2. Describe how a hierarchical network supports the voice, video, and data needs of a small- or mediumsized business. 3. Describe the functions of each of the three levels of the hierarchical network design model, the principles of hierarchical network design (aggregate connectivity, network diameter, and redundancy), and the concept of a converged network.. 4. Identify, install, configure, and differentiate between network devices such as, NICs, concentrators, hubs, bridges, switches, routers, and gateways. 5. Provide examples of how voice and video over IP affect network design. 6. Select appropriate devices to operate at each level of the hierarchy, including voice and video components. 7. Match the appropriate Cisco switch to each layer in the hierarchical network design model. 8. Summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard. 9. Explain the functions that enable a switch to forward Ethernet frames in a LAN. 10. Configure a switch for operation in a network designed to support voice, video, and data transmissions. 11. Configure basic security on a switch that will operate in a network designed to support voice, video, and data transmissions. 12. Explain the role of VLANs in a network. 13. Explain the role of trunking VLANs in a network. 14. Configure VLANs on the switches in a network topology. 15. Troubleshoot the common software or hardware configuration problems associated with VLANs on switches in a network topology. 16. Explain the role of VTP in a converged switched network. 17. Describe the operation of VTP including domains, modes, advertisements, and pruning. 18. Configure VTP on the switches in a converged network. 19. Explain the role of redundancy in a converged network. 20. Summarize how STP works to eliminate Layer 2 loops in a converged network. 21. Explain how the STP algorithm uses three steps to converge on a loop-free topology. 22. Implement rapid PVST+ in a LAN to prevent loops between redundant switches. 23. Explain how network traffic is routed between VLANs in a converged network. 24. Configure inter-vlan routing on a router to enable communication between end-user devices on separate VLANs. 25. Troubleshoot common inter-vlan connectivity issues. 26. Describe the basic IEEE 802 11 wireless security protections and policies
27. Understand wireless security protocols, such as WEP, WPA, and 802 11i 28. Describe the components and basic operation of wireless LANs. 29. Describe the components and operations of basic WLAN security. 30. Configure and verify basic wireless LAN access. 31. Troubleshoot wireless client access. 32. Describe Identity Based Networking Services (IBNS) 33. Configure 802.1x Port-Based Authentication 34. Describe how the Cisco enterprise architecture provides integrated services over an enterprise network. 35. Describe key WAN technology concepts. 36. Select the appropriate WAN technology to meet different enterprise business requirements. 37. Describe the fundamental concepts of point-to-point serial communication. 38. Describe key PPP concepts. 39. Configure PPP encapsulation. 40. Explain and configure PAP and CHAP authentication. 41. Describe the fundamental concepts of Frame Relay technology in terms of enterprise WAN services, including operation, implementation requirements, maps, and Local Management Interface (LMI) operation. 42. Configure a basic Frame Relay permanent virtual circuit (PVC), including configuring and troubleshooting Frame Relay on a router serial interface and configuring a static Frame Relay map. 43. Describe advanced concepts of Frame Relay technology in terms of enterprise WAN services, including subinterfaces, bandwidth, and flow control. 44. Configure an advanced Frame Relay PVC, including solving reachability issues, configuring subinterfaces, and verifying and troubleshooting a Frame Relay configuration. 45. Identify security threats to enterprise networks 46. Describe methods to mitigate security threats to enterprise networks 47. Define defense in depth and give examples of defense in depth methods and policy 48. Define system security architectures, identify appropriate security architectures for use in assigned IS, and address system security architecture study. 49. Configure basic router security 50. Disable unused router services and interfaces 51. Use the Cisco one-step lockdown feature 52. Manage files and software images with the Cisco IOS Integrated File System (IFS) 53. Explain how ACLs are used to secure a medium-size enterprise branch office network, including the concept of packet filtering, the purpose of ACLs, how ACLs are used to control access, and the types of Cisco ACLs. 54. Configure standard ACLs in a medium-size enterprise branch office network, including defining filtering criteria, configuring standard ACLs to filter traffic, and applying standard ACLs to router interfaces. 55. Configure extended ACLs in a medium-size enterprise branch office network, including configuring extended ACLs and named ACLs, configuring filters, verifying and monitoring ACLs, and troubleshooting extended ACL issues. 56. Describe complex ACLs in a medium-size enterprise branch office network, including configuring dynamic, reflexive, and timed ACLs, verifying and troubleshooting complex ACLs, and explaining relevant caveats. 57. Describe the enterprise requirements for providing teleworker services, including the differences between private and public network infrastructures. 58. Describe the teleworker requirements and recommended architecture for providing teleworking services.
59. Explain how broadband services extend enterprise networks using DSL, cable, and wireless technology. 60. Describe the importance of VPN technology, including its role and benefits for enterprises and teleworkers. 61. Describe how VPN technology can be used to provide secure teleworker services to an enterprise network. 62. Configure DHCP in an Enterprise branch network. This includes being able to explain DHCP features and benefits, the differences between BOOTP and DHCP, DHCP operation: and configuring, verifying, and troubleshooting DHCP. 63. Configure NAT on a Cisco router. This includes explaining key features and operation of NAT and NAT Overload, explaining advantages and disadvantages of NAT, configuring NAT and NAT Overload to conserve IP address space in a network, configuring port forwarding, and verifying and troubleshooting NAT configurations. 64. Configure new generation RIP (RIPng) to use IPv6. This includes explaining how IPv6 solves any problem of IP address deletion, explaining how to assign IPv6 addresses, describing transition strategies for implementing IPv6 and configuring, verifying and troubleshooting RIPng for IPv6. 65. Establish and document a network baseline. 66. Describe the various troubleshooting methodologies and troubleshooting tools. 67. Describe the common issues that occur during WAN implementation. 68. Identify and troubleshoot common enterprise network implementation issues using a layered model approach. Learning Units I. LAN Design a. Switched LAN Architecture b. Matching Switches to Specific LAN Functions II. Basic Switch Concepts and Configuration a. Introduction to Ethernet/802.3 LANs b. Forwarding Frames using a Switch c. Switch Management Configuration d. Configuring Switch Security III. VLANs (Virtual LANs) a. Introducing VLANs b. VLAN Trunking c. Configure VLANs and Trunks d. Troubleshooting VLANs and Trunks IV. VTP (VLAN Trunking Protocol) a. VTP Concepts b. VTP Operation c. Configure VTP V. STP (Spanning Tree Protocol) a. Redundant Layer 2 Topologies b. Introduction to STP c. STP Convergence d. PVST+, RSTP and Rapid PVST+ VI. Inter-VLAN Routing a. Inter-VLAN Routing b. Configuring Inter-VLAN Routing c. Troubleshooting Inter-VLAN Routing
VII. Basic Wireless Concepts and Configuration a. The Wireless LAN b. Wireless LAN Security c. Configure Wireless LAN Access d. Troubleshooting Simple WLAN Problems VIII. Configure Trust and Identity at Layer 2 a. Identity-Based Networking Services (IBNS) b. Configuring 802.1x Port-Based Authentication IX. Introduction to WANs (Wide Area Networks) a. Providing Integrated Services to the Enterprise b. WAN Technology Concepts c. WAN Connection Options X. PPP (Point to Point Protocol) a. Serial Point-to-Point Links b. PPP Concepts c. Configuring PPP d. Configuring PPP with Authentication XI. Frame Relay a. Basic Frame Relay Concepts b. Configuring Frame Relay c. Configuring Advanced Frame Relay XII. Network Security a. Introduction to Network Security b. Securing Cisco Routers c. Secure Router Network Services d. Using Cisco SDM e. Secure Router Management XIII. ACLs (Access Control Lists) a. Using ACLs to Secure Networks b. Configuring Standard ACLs c. Configuring Extended ACLs d. Configure Complex ACLs XIV. Teleworker Services a. Business Requirements for Teleworker Services b. Broadband Services c. VPN Technology XV. IP Addressing Services a. DHCP b. Scaling Networks with NAT c. IPv6 XVI. Network Troubleshooting a. Establishing the Network Performance Baseline b. Troubleshooting Methodologies and Tools c. Common WAN Implementation Issues d. Network Troubleshooting Method of Delivery/Instruction X Face-to-face Blended Online
Learning activities will be assigned within and outside the classroom to assist the student to achieve the intended learning outcomes through lecture, Instructor-led class discussion, guest speakers, group activities, lab, drills/skill practice, and others at the discretion of the instructor. Method of Grading and Evaluation The student will be graded on learning activities and assessment tasks. Grade determinants may include the following: daily work, quizzes, chapter or unit tests, comprehensive examinations, student projects, student presentations, class participation, and other methods of evaluation employed at the discretion of the instructor.