LAN Switching and Wireless CCNA Exploration Companion Guide 1st Edition Refreshed edition of 1-58713-207-9 / 978-1-58713-207-0 Copyright 2008 Cisco Systems, Inc. Copyright © 2012 Cisco Systems, Inc. ISBN-10: 1-58713-273-7 ISBN-13: 9-781-58713-273-5 Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it. When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing. First Printing: April 2008 Corrections for all Printings Pg Error Correction Chapter 2, Page 49 Figure 2-3 Reads: Local Should read: U/L Chapter 2, Page 49 Figure 2-3 Reads: Vendor Assigned Should read: Universally or Locally Administered Address Bit Chapter 2, Page 49 Reads: The broadcast or multicast bit in a MAC address indicates to the Should read: The broadcast/multicast bit in a MAC address indicates to the receiving Updated 12/17/2010 Third paragraph receiving interface that the frame is destined for all or a group of end stations on the LAN segment. interface that the frame is destined for all or a group of end stations on the LAN segment. Chapter 2, Page 49 Fourth Paragraph Reads: The locally administered address bit indicates whether the vendor-assigned MAC address can be modified locally. Should read: Universally administered addresses have the U/L bit set to 0 and they are globally/universally unique – this is the normal case. If the U/L bit is set to 1, the entire address (all 48 bits) have been locally administered and may not be globally unique. Chapter 2, Page 71, Switch Book Sequence - Second Paragraph, first sentence Reads: The switch loads the boot loader software. The book loader is a small program stored in non-volatile RAM (NVRAM) and is run when the switch is first turned on. Should read: The switch loads the boot loader software. The book loader is a small program stored in non-volatile ROM and is run when the switch is first turned on. Chapter 2, Page 86 Caution line Reads: If no password is defined and Should read: When there is no password on login is still enabled, there is no access the console line, the user will still have to the console. access to the console. Chapter 2, Page 88 Step 3 Reads: Remove the password from the console line using the no password command: If no password is defined and login is still enabled, there is no access to the console. Should read: Remove the password from the vty lines using the no password command: If no password is defined and login is still enabled, there is no access to the console. Chapter 2, Page 106 Reads: If you disable sticky learning by using the no switchport portsecurity mac-address sticky interface configuration command, the sticky secure MAC addresses remain part of the running configuration but are removed from the address table. Reads: S1 (config – if)# switchport trunk allowed vlan add vlan-list Should read: If you disable sticky learning by using the no switchport port-security macaddress sticky interface configuration command, the sticky secure MAC addresses remain part of the address table but are removed from the running configuration. Tenth line down Chapter 3, Page 161 Table 3-7 Should read: S1 (config – if)# switchport trunk allowed vlan vlan-list Updated 12/17/2010 Chapter 3, Page 162 Example 3-16 Reads: S1 (config – if)# swtichport trunk allowed vlan add 10,20,30 Should read: S1 (config – if)# swtichport trunk allowed vlan 10,20,30 Chapter 4, Page 191 Figure 4-12 Reads: DSAP = AA SSAP = AA Should read: OUI: cisco Type: 2003 Chapter 4, Page 192 First Bullet Reads: SNAP field: Subnetwork Access Should Read: SNAP field: Subnetwork Access Protocol (SNAP) field has an OUI set to Protocol (SNAP) field has an OUI set to cisco AAAA and type set to 2003. and type set to 2003. Chapter 5, Page 296 Figure 5-70 Column ‘Flag Field’ reads: Bits 7 6 (indent bits under 2-3 4-5 (00, 01, 10, 11)) 00 01 10 11 3 2 1 0 Chapter 5, Page 296 Reads: Bits 0 and 7 are used for First Bullet topology change notification and acknowledgement as they are in 802.1D. Chapter 5, Page 296 Reads: Bits 4 and 5 are used to encode the port role using a 2-bit Last Bullet code. Chapter 5, Page 301 Reads: Next, synchronization begins Last Paragraph between S1 and S4. The proposal BPDU received from S1 on port F0/5 has a higher path cost than the cached value so all non-edge ports are blocked. Column ‘Flag Field’ should read: Bits 0 1 2-3 00 01 10 11 4 5 6 7 Should read: Bits 0 and 7 are used for topology change (TC) and acknowledgement (TCA), respectively. Should read: Bits 2 and 3 are used to encode the port role using a 2-bit code. Should read: Next, synchronization begins between S1 and S4. The proposal BPDU received from S1 on port F0/5 has a lower path cost than the cached value so all nonedge ports are blocked. Updated 12/17/2010 Chapter 5, Page 303 Caption Under Figure 5-79 Chapter 5, Page 327 Example 5-28 Chapter 6, Page 335 Figure 6-3 Chapter 6, Page 336 Reads:The proposal BPDU received from S4 on port F0/2 has a higher path cost than the cached value so all non-edge ports are blocked; Port F0/3 on S2 is blocked during the synchronization period. Last line in box: Reads: VLAN0001 Label for R1 Reads: R1- F0/1 enabled Should read: Reads: The proposal BPDU received from S4 on port F0/2 has a lower path cost than the cached value so all nonedge ports are blocked; Port F0/3 on S2 is blocked during the synchronization period. Should read: VLAN0001 disabled Should read: R1 – F0/0 Reads: 3. Switch S1 forwards the tagged traffic out the other trunk interface on port F0/5 to interface F0/1 on router R1. Label for R1 Reads: R1 – F0/1 Should read: 3. Switch S1 forwards the tagged traffic out the other trunk interface on port F0/5 to interface F0/0 on router R1. Chapter 7, Page 416 Second, Third Fourth and Fifth Bulleted Points Reads: ‘older’ Should read: ‘newer’ Chapter 7, Page 417 Figure 7-43 Reads: (top right hand side of figure) PSK Personal Should read: (top right hand side of figure) PSK2 Personal Chapter 7, Page 417 Figure 7-43 Reads: (bottom left hand side of figure) PSK2 Enterprise Should read: (bottom left hand side of figure) PSK Enterprise Number 3 Chapter 6, Page 342 Figure 6-6 Should read: R1 – F0/0 Updated 12/17/2010 This errata sheet is intended to provide updated technical information. Spelling and grammar misprints are updated during the reprint process, but are not listed on this errata sheet. Updated 12/17/2010