CCNA certification prep: Network Access

Introduction

Network access topics make up a sizable part of the 200-301 CCNA exam. This article describes what is and is not covered by network access and what you need to know to be well-prepared for the exam.

What percentage of the exam focuses on network access?

Your CCNA exam is 20% network access questions, which makes it an important topic. Network access technologies are also relevant to entry-level networking and IT roles.

What topics are covered in this section of the exam?

The CCNA exam includes the following topics under the umbrella of network access:

  1. Configure and verify VLANs
  2. Configure and verify inter-switch connectivity
  3. Configure and verify Cisco Discovery Protocol and LLDP
  4. Configure and verify EtherChannel (LACP)
  5. Rapid PVST+ Spanning Tree Protocol
  6. Cisco Wireless Architectures and AP modes
  7. WLAN components
  8. AP and WLC management access connections

To know what’s covered by each of these topics and the level of understanding and skills you need to have in each area, read on.

High-level overview of network access topics

The CCNA certification covers wired and wireless network access technologies. We’ll be exploring those next.

How to configure and verify VLANs

You can create two (or more) broadcast domains with a single switch by creating two (or more) VLANs, or virtual LANs. You assign some interfaces of the switch to the first VLAN and assign the rest to the second VLAN. The switch knows which interfaces belong to which VLAN.

Learn how to configure and verify VLANs and know the available configuration options. To create a VLAN, use the vlan vlan-id command in global configuration mode. To assign an interface to a VLAN, use the switchport access vlan vlan-id command in interface configuration mode. You can verify your configuration by using the show vlan brief command.

How to configure and verify inter-switch (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Paris Arau. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/fBGXqzIWffA/