1. Configure and Verify Access Control Lists
1.1. VACL, RACL, PACL, MACL
2. VTPv1 , VTPv2, VTPv3, VTP Pruning
2.1. VTPv3 Supports Extended VLANs
2.2. VTPv1 Is Default
2.3. VTPv2
3. Switch
3.1. Layer 2 Technologies
3.1.1. Configure and Verify Switch Administration
3.1.1.1. SDM Templates
3.1.1.2. Managing MAC address table
3.1.1.3. Troubleshoot Err-Disable recovery
3.1.2. Configure and Verify Layer 2 Protocols
3.1.2.1. CDP, LLDP
3.1.2.2. UDLD
3.1.2.2.1. Aggressive
3.1.3. Configure and Verify VLANs
3.1.3.1. Access Ports
3.1.3.2. VLAN Database
3.1.3.3. Normal, Extended VLAN, Voice VLAN
3.1.4. Configure and Verify Trunking
3.1.4.1. dot1q
3.1.4.1.1. IEEE Standard
3.1.4.2. ISL
3.1.4.2.1. Cisco Prioprietary
3.1.4.3. Native VLAN
3.1.4.3.1. Untagged
3.1.5. Configure and Verify Etherchannels
3.1.5.1. Manual Pruning
3.1.5.1.1. switchport trunk allowed vlan x,xx,xxx
3.1.5.2. LACP, PAgP, manual
3.1.5.3. Etherchannel Misconfiguration Guide
3.1.5.4. Layer 2, Layer 3
3.1.5.5. Load Balancing
3.1.6. PortFast, BPDUGuard, BPDUFilter
3.1.7. Configure and Verify Spanning Tree
3.1.7.1. PVST+, RPVST+, MST
3.1.7.2. Switch Priority, Port Priority, Path Cost, STP Timers
3.1.7.3. LoopGuard and RootGuard
3.1.8. Configure and Verify other LAN switching technologies
3.1.8.1. SPAN, RSPAN
3.1.9. Describe Chassis Virtualization and Aggregation Technologies
3.1.9.1. Stackwise, VSS, SSO, VSL
3.1.10. Configure and Verify AAA Technologies
3.1.10.1. TACACS+, RADIUS, 802.1x