Cisco Certified Network Professional (CCNP) - Enterprise
1 Introduction to Enterprise Networks
1-1 Enterprise Network Architecture
1-2 Network Design Principles
1-3 Network Security in Enterprise Environments
1-4 Network Management and Monitoring
2 Network Infrastructure
2-1 Cabling and Connectivity
2-2 Network Topologies
2-3 Network Devices (Switches, Routers, Firewalls)
2-4 Network Addressing (IP, Subnetting)
3 Switching Technologies
3-1 Layer 2 Switching
3-2 VLANs and Trunking
3-3 Spanning Tree Protocol (STP)
3-4 EtherChannel and Link Aggregation
3-5 Virtual Switching Systems (VSS)
4 Routing Technologies
4-1 Static Routing
4-2 Dynamic Routing Protocols (RIP, EIGRP, OSPF, BGP)
4-3 Route Redistribution and Filtering
4-4 IPv6 Routing
4-5 Policy-Based Routing (PBR)
5 Network Automation and Programmability
5-1 Introduction to Network Automation
5-2 Python for Network Automation
5-3 RESTful APIs and NETCONFYANG
5-4 Ansible for Network Automation
5-5 Network Programmability with Cisco DNA Center
6 Network Security
6-1 Network Security Fundamentals
6-2 Access Control Lists (ACLs)
6-3 Intrusion Detection and Prevention Systems (IDSIPS)
6-4 Virtual Private Networks (VPNs)
6-5 Firewalls and Security Zones
7 Wireless Networking
7-1 Wireless LAN Fundamentals
7-2 Wireless Security Protocols (WPA, WPA2, WPA3)
7-3 Wireless Site Surveys
7-4 Wireless Network Design
7-5 Wireless Network Management
8 Network Services
8-1 DHCP and DNS
8-2 Network Time Protocol (NTP)
8-3 Quality of Service (QoS)
8-4 Network Address Translation (NAT)
8-5 Network Management Protocols (SNMP, Syslog)
9 Network Troubleshooting
9-1 Troubleshooting Methodologies
9-2 Common Network Issues
9-3 Troubleshooting Tools (Ping, Traceroute, Wireshark)
9-4 Troubleshooting Wireless Networks
9-5 Troubleshooting Security Issues
10 Enterprise Network Design
10-1 Network Design Models (Hub-and-Spoke, Mesh)
10-2 Network Redundancy and High Availability
10-3 Network Scalability and Performance
10-4 Network Documentation and Diagrams
10-5 Case Studies and Real-World Scenarios
3.1 Layer 2 Switching

3.1 Layer 2 Switching

Key Concepts

MAC Address Learning

MAC Address Learning is the process by which a switch learns the MAC addresses of devices connected to its ports. When a device sends a frame, the switch records the source MAC address and the port it was received on in its MAC address table. This table is used to make forwarding decisions.

Example: Imagine a switch as a receptionist in an office. When an employee (device) enters and presents their ID (MAC address), the receptionist notes down their name and the room they are in (port). This helps the receptionist direct future visitors to the correct room.

Forwarding and Filtering

Forwarding is the process of sending a frame out of the appropriate port based on the destination MAC address. Filtering ensures that frames are only sent to the intended recipient, not broadcast to all ports. Switches use the MAC address table to determine the correct port for forwarding and filtering.

Example: Think of a switch as a mailroom. When a letter (frame) arrives with a specific address (destination MAC), the mailroom worker (switch) looks up the address in the directory (MAC address table) and sends the letter only to the intended recipient's mailbox (port), not to everyone.

Collision Domains

A collision domain is a network segment where data packets can collide with each other if they are transmitted simultaneously. Switches divide collision domains by creating separate broadcast domains for each port, reducing the likelihood of collisions.

Example: Consider a collision domain as a crowded street where cars (data packets) might crash into each other. A switch acts like a traffic light, dividing the street into lanes (ports) so that cars can move smoothly without collisions.

Spanning Tree Protocol (STP)

Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for Ethernet networks. It prevents broadcast storms and network instability by disabling redundant paths that could create loops. STP dynamically selects the best path for data to travel.

Example: Think of STP as a gardener pruning a tree to ensure it grows in the right direction without crossing branches (loops). The gardener (STP) removes excess branches (redundant paths) to maintain a healthy tree (network).

VLANs (Virtual LANs)

VLANs allow you to segment a physical network into multiple logical networks. This enhances security and performance by isolating traffic between different VLANs. Switches can tag frames with VLAN IDs to ensure they are sent to the correct VLAN.

Example: Imagine a large office building where each department (VLAN) has its own floor but shares the same elevator (switch). The elevator operator (switch) ensures that employees (frames) go to the correct floor by checking their department ID (VLAN tag).