Cisco Certified Design Professional (CCDP) - Enterprise
1 Enterprise Architecture and Design Principles
1-1 Enterprise Network Design Concepts
1-1 1 Network Design Life Cycle
1-1 2 Design Considerations for Enterprise Networks
1-1 3 Network Segmentation and Micro-Segmentation
1-1 4 Network Security Design Principles
1-1 5 Network Scalability and Performance
1-1 6 Network Resilience and Redundancy
1-1 7 Network Automation and Programmability
1-1 8 Network Virtualization and SDN
1-1 9 Network Management and Monitoring
1-1 10 Compliance and Regulatory Requirements
1-2 Enterprise Network Design Models
1-2 1 Hierarchical Network Design Model
1-2 2 Spine-Leaf Architecture
1-2 3 Modular Network Design
1-2 4 Centralized vs Distributed Network Design
1-2 5 Hybrid Network Design Models
1-3 Enterprise Network Design Tools and Methodologies
1-3 1 Network Design Documentation
1-3 2 Network Design Software Tools
1-3 3 Network Design Methodologies (e g , TOGAF, Zachman)
1-3 4 Network Design Best Practices
2 Enterprise Network Infrastructure Design
2-1 Campus Network Design
2-1 1 Campus Network Topologies
2-1 2 Campus Network Access Layer Design
2-1 3 Campus Network Distribution Layer Design
2-1 4 Campus Network Core Layer Design
2-1 5 Campus Network Wireless Design
2-1 6 Campus Network Security Design
2-1 7 Campus Network Management and Monitoring
2-2 Data Center Network Design
2-2 1 Data Center Network Topologies
2-2 2 Data Center Network Fabric Design
2-2 3 Data Center Network Redundancy and Resilience
2-2 4 Data Center Network Security Design
2-2 5 Data Center Network Virtualization
2-2 6 Data Center Network Automation
2-2 7 Data Center Network Management and Monitoring
2-3 WAN Design
2-3 1 WAN Topologies
2-3 2 WAN Connectivity Options (e g , MPLS, VPN, Internet)
2-3 3 WAN Optimization Techniques
2-3 4 WAN Security Design
2-3 5 WAN Management and Monitoring
2-4 Cloud and Hybrid Network Design
2-4 1 Cloud Network Design Principles
2-4 2 Hybrid Network Design
2-4 3 Cloud Connectivity Options
2-4 4 Cloud Network Security Design
2-4 5 Cloud Network Management and Monitoring
3 Enterprise Network Services Design
3-1 IP Addressing and Subnetting
3-1 1 IPv4 and IPv6 Addressing
3-1 2 Subnetting Techniques
3-1 3 IP Address Management (IPAM)
3-1 4 Addressing for Network Virtualization
3-2 Routing Protocols and Design
3-2 1 Interior Gateway Protocols (e g , OSPF, EIGRP)
3-2 2 Exterior Gateway Protocols (e g , BGP)
3-2 3 Routing Policy Design
3-2 4 Route Redistribution and Filtering
3-2 5 Routing for Network Virtualization
3-3 Switching and VLAN Design
3-3 1 Layer 2 Switching Protocols (e g , STP, VTP)
3-3 2 VLAN Design and Implementation
3-3 3 Trunking and Inter-VLAN Routing
3-3 4 Virtual Switching (e g , VSS, VPC)
3-3 5 Switching for Network Virtualization
3-4 Network Security Services Design
3-4 1 Firewall Design and Implementation
3-4 2 Intrusion Detection and Prevention Systems (IDSIPS)
3-4 3 Network Access Control (NAC)
3-4 4 VPN Design and Implementation
3-4 5 Secure Network Design Best Practices
3-5 Network Management and Monitoring Services Design
3-5 1 Network Management Protocols (e g , SNMP, NetFlow)
3-5 2 Network Monitoring Tools and Techniques
3-5 3 Network Performance Optimization
3-5 4 Network Troubleshooting and Diagnostics
3-5 5 Network Management for Virtualized Environments
4 Enterprise Network Implementation and Optimization
4-1 Network Implementation Planning
4-1 1 Implementation Project Management
4-1 2 Implementation Documentation
4-1 3 Implementation Best Practices
4-1 4 Implementation Testing and Validation
4-2 Network Optimization Techniques
4-2 1 Network Performance Tuning
4-2 2 Network Traffic Analysis and Optimization
4-2 3 Network Latency Reduction Techniques
4-2 4 Network Optimization for Virtualized Environments
4-3 Network Troubleshooting and Diagnostics
4-3 1 Troubleshooting Methodologies
4-3 2 Common Network Issues and Solutions
4-3 3 Network Diagnostics Tools and Techniques
4-3 4 Troubleshooting for Virtualized Networks
4-4 Network Compliance and Audit
4-4 1 Network Compliance Requirements
4-4 2 Network Audit Procedures
4-4 3 Network Compliance Best Practices
4-4 4 Network Compliance for Virtualized Environments
5 Enterprise Network Design Case Studies
5-1 Campus Network Design Case Study
5-1 1 Case Study Overview
5-1 2 Design Considerations
5-1 3 Implementation and Optimization
5-1 4 Lessons Learned
5-2 Data Center Network Design Case Study
5-2 1 Case Study Overview
5-2 2 Design Considerations
5-2 3 Implementation and Optimization
5-2 4 Lessons Learned
5-3 WAN Design Case Study
5-3 1 Case Study Overview
5-3 2 Design Considerations
5-3 3 Implementation and Optimization
5-3 4 Lessons Learned
5-4 Cloud and Hybrid Network Design Case Study
5-4 1 Case Study Overview
5-4 2 Design Considerations
5-4 3 Implementation and Optimization
5-4 4 Lessons Learned
3-3- Switching and VLAN Design

3-3- Switching and VLAN Design

Key Concepts

Layer 2 Switching

Layer 2 Switching operates at the Data Link layer of the OSI model. It uses MAC addresses to forward data frames between network devices. Switches maintain a MAC address table to determine the appropriate port for forwarding frames, reducing network congestion and improving performance.

Example: In a small office network, a Layer 2 switch can connect multiple devices, such as computers, printers, and servers, and ensure that data frames are forwarded only to the intended recipient, minimizing unnecessary broadcast traffic.

Virtual LANs (VLANs)

Virtual LANs (VLANs) are logical network segments created within a physical network. VLANs allow network administrators to group devices based on function, department, or application, regardless of their physical location. This enhances security, performance, and manageability.

Example: A large enterprise might create VLANs for different departments, such as HR, IT, and Sales. Each VLAN can be configured with its own security policies and access controls, ensuring that sensitive data is isolated and protected.

Trunking

Trunking is the process of carrying multiple VLANs over a single physical link between switches. Trunk links use special encapsulation methods, such as 802.1Q, to tag frames with VLAN information, allowing them to be correctly routed to the appropriate VLAN.

Example: In a campus network, a trunk link between two switches can carry traffic for multiple VLANs, such as VLAN 10 for HR and VLAN 20 for IT. This reduces the number of physical links required and simplifies network management.

VLAN Trunking Protocol (VTP)

VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol used to manage VLANs across a network. VTP allows network administrators to create, modify, and delete VLANs on a central VTP server, which then propagates these changes to all switches in the VTP domain.

Example: A network administrator can configure a new VLAN on the VTP server, and VTP will automatically update the VLAN configuration on all switches in the domain, ensuring consistency and reducing manual configuration errors.

Inter-VLAN Routing

Inter-VLAN Routing is the process of enabling communication between devices on different VLANs. This is typically achieved by using a router or Layer 3 switch to route traffic between VLANs. Each VLAN is treated as a separate subnet, and routing is performed based on IP addresses.

Example: In a corporate network, a Layer 3 switch can route traffic between VLANs, allowing devices in the HR VLAN to communicate with devices in the IT VLAN. This ensures that network segmentation is maintained while enabling necessary inter-VLAN communication.

Examples and Analogies

Think of Layer 2 Switching as a mail sorter in a post office who uses addresses to deliver letters to the correct recipients, ensuring efficient and direct delivery.

VLANs are like virtual office spaces within a building, where each space has its own set of rules and access controls, even though they share the same physical infrastructure.

Trunking is akin to a multi-lane highway that carries traffic for different destinations (VLANs) over a single road, using special markings (tags) to ensure each vehicle reaches the correct destination.

VTP is like a central office that manages the creation and distribution of new office spaces (VLANs) across multiple buildings, ensuring consistency and reducing manual work.

Inter-VLAN Routing is like a traffic controller who directs vehicles between different office spaces (VLANs), ensuring that they can communicate while maintaining their separate identities.

By understanding these key concepts, network professionals can design efficient, secure, and scalable switching and VLAN solutions that meet the needs of modern enterprise networks.