300-115: CCNP Cisco IP Switched Networks (SWITCH v2.0) Certification Video Training Course
300-115: CCNP Cisco IP Switched Networks (SWITCH v2.0) Certification Video Training Course includes 7 Lectures which proven in-depth knowledge on all key concepts of the exam. Pass your exam easily and learn everything you need with our 300-115: CCNP Cisco IP Switched Networks (SWITCH v2.0) Certification Training Video Course.
Curriculum for Cisco CCNP 300-115 Certification Video Training Course
300-115: CCNP Cisco IP Switched Networks (SWITCH v2.0) Certification Video Training Course Info:
The Complete Course from ExamCollection industry leading experts to help you prepare and provides the full 360 solution for self prep including 300-115: CCNP Cisco IP Switched Networks (SWITCH v2.0) Certification Video Training Course, Practice Test Questions and Answers, Study Guide & Exam Dumps.
This comprehensive Cisco CCNP Switch (300-115) training course is designed for networking professionals who are ready to take their skills to an advanced level. The course focuses on enterprise switching technologies and is structured to give learners a practical and theoretical mastery of Cisco’s switching platforms. It has been carefully created to prepare you not just for the exam, but for real-world network design, implementation, and troubleshooting. The course covers everything from fundamental Layer 2 concepts to advanced high availability and security configurations, ensuring that you are ready to handle complex enterprise networks with confidence.
This course is structured into four detailed parts that each explore critical switching topics in depth. The first part introduces you to the fundamentals of enterprise switching, VLANs, trunking, and Spanning Tree Protocol. The second part explores advanced Layer 2 features including EtherChannel, multilayer switching, and redundancy protocols. The third part focuses on switch security and infrastructure hardening including AAA, DHCP snooping, and advanced port security. The final part is entirely dedicated to troubleshooting, verification, network monitoring, and preparing you for the CCNP Switch exam with lab scenarios and practice questions.
This course is designed for learners who already have a basic understanding of networking fundamentals and IP addressing. It is strongly recommended that participants have CCNA-level knowledge of switching concepts, including basic VLAN configuration, IP addressing schemes, and a familiarity with Cisco IOS command-line navigation. Access to either Cisco switches, a network simulator such as Packet Tracer or GNS3, or a virtual lab environment is encouraged to practice the configurations presented throughout the course.
Cisco’s CCNP Switch (300-115) certification exam is one of the three exams required to achieve the CCNP Routing and Switching certification, which is recognized globally as a standard for professional-level network engineers. This course has been developed to provide a deep understanding of enterprise switching networks, from theoretical design principles to hands-on configuration and verification. The material blends conceptual explanations with live configuration examples and troubleshooting demonstrations, giving you not only the knowledge to pass the exam but also the confidence to manage enterprise network infrastructure.
This course is intended for network engineers, system administrators, IT professionals, and anyone preparing for the CCNP Switch 300-115 certification exam. It is ideal for those working in enterprise environments who need to design, implement, and maintain switching solutions or troubleshoot existing networks. It also suits learners who are aiming for a promotion into a network engineer role, as well as consultants or freelancers who require advanced Cisco switching skills to work with clients.
Enterprise switching is the foundation upon which all modern networks operate. At the heart of every medium and large organization lies a switching infrastructure that must be designed to be efficient, scalable, and resilient. This first part of the course is dedicated to giving you a comprehensive understanding of how switches function, how they forward frames, and how you can manipulate their behavior to create logical topologies that meet business requirements. The central theme here is mastering VLANs, trunking, and the Spanning Tree Protocol because these three technologies are the building blocks for everything that follows in a network design.
Virtual Local Area Networks or VLANs are critical because they provide logical segmentation of networks at Layer 2. Without VLANs, every device connected to a switch would share a single broadcast domain which leads to unnecessary broadcast traffic and potential security concerns. VLANs solve this problem by allowing you to assign ports to different broadcast domains regardless of their physical location. For example, the Human Resources department can be placed in VLAN 20, Finance in VLAN 10, and Engineering in VLAN 30 even if they are scattered across different floors. The configuration of VLANs on Cisco switches is straightforward but understanding the implications of VLAN design is crucial. When you create a VLAN and assign ports to it, you are effectively creating a separate Layer 2 network. You can then use inter-VLAN routing to allow communication between them when needed.
Trunking is another fundamental concept that you must master. When multiple switches need to pass traffic for multiple VLANs across a single physical link, trunking is the solution. Cisco switches implement trunking using IEEE 802.1Q encapsulation which inserts a VLAN tag into the Ethernet frame header to indicate which VLAN the frame belongs to. This allows a single interface to carry traffic for dozens or even hundreds of VLANs simultaneously, making it efficient and scalable. Configuring trunk ports involves changing the switchport mode to trunk and specifying which VLANs are allowed to traverse the trunk. Failing to properly configure trunking can lead to VLAN mismatch problems, which can result in traffic being dropped or broadcast storms that bring down the network.
VLAN Trunking Protocol or VTP is a Cisco proprietary feature that can automatically propagate VLAN information across multiple switches in the same VTP domain. While this is convenient, it can be dangerous if misused. A switch with a higher revision number but an empty VLAN database can wipe out VLANs across the entire network. For this reason, many engineers configure switches in VTP transparent mode and manually configure VLANs, thus maintaining full control of their environment.
Once VLANs and trunks are configured, you must deal with the risk of loops. Because Ethernet has no native loop prevention mechanism, adding redundant links can lead to catastrophic broadcast storms. The Spanning Tree Protocol solves this by calculating a loop-free logical topology and blocking redundant links until they are needed. STP elects a root bridge based on the lowest bridge ID, which is a combination of priority and MAC address. It then determines the best path to the root and assigns port roles as root ports, designated ports, or non-designated ports. The ports move through states such as blocking, listening, learning, and forwarding until a stable topology is established. You can view this topology with the show spanning-tree command and influence root bridge selection by manually setting the bridge priority.
Rapid Spanning Tree Protocol or RSTP improves on the original STP by dramatically reducing convergence times, often to less than a second. Cisco’s Rapid PVST+ allows a separate RSTP instance to run per VLAN, giving you granular control and fast convergence. In a well-designed network, you should enable Rapid PVST+ so that topology changes do not cause long outages.
STP enhancements such as PortFast, BPDU Guard, Root Guard, and Loop Guard are crucial to network stability. PortFast allows access ports connected to end devices to immediately transition to the forwarding state, avoiding unnecessary delays during host boot-up. However, PortFast should never be enabled on ports connected to other switches. To protect against misconfiguration, BPDU Guard can be enabled so that if a BPDU is received on a PortFast-enabled port, the port is shut down to prevent an accidental loop. Root Guard is used on ports where you never want another switch to become the root bridge, while Loop Guard helps prevent loops caused by unidirectional link failures by keeping a port in a loop-inconsistent state rather than letting it transition to forwarding.
Troubleshooting Layer 2 issues is an important skill for the CCNP Switch candidate. Common issues include incorrect VLAN assignment, trunk mismatches, and unexpected root bridge elections. You must be comfortable using show vlan brief to confirm VLAN membership, show interfaces trunk to verify trunk status, and show spanning-tree to check which switch is acting as root and which ports are blocking. If necessary, you can force a particular switch to be root by configuring spanning-tree vlan x priority 4096 which sets a lower priority than the default, making it more likely to win the election.
The best practices for Layer 2 design are to manually define the root bridge for predictable behavior, enable PortFast and BPDU Guard on all user-facing ports, prune unused VLANs from trunk links to reduce broadcast traffic, and always use Rapid STP to ensure the network converges quickly during topology changes. By following these practices you create a stable and efficient switching environment that is ready for growth and future integration with more advanced technologies.
As networks expand, the requirements for performance, reliability, and scalability increase dramatically. It is no longer enough to simply configure VLANs and rely on basic STP to prevent loops. Enterprise environments require techniques to aggregate bandwidth, eliminate single points of failure, and implement Layer 3 functionality at the distribution layer for efficient routing between VLANs. This part of the course builds on the fundamentals of Part 1 and focuses on EtherChannel aggregation, first hop redundancy protocols, and multilayer switching, all of which are essential for achieving a robust and highly available network infrastructure.
EtherChannel technology allows multiple physical links to operate as a single logical connection, providing both redundancy and increased throughput. Without EtherChannel, additional links between switches might sit idle because STP blocks them to avoid loops, wasting available bandwidth. By bundling links into a port-channel, STP sees them as a single logical interface and allows all links in the bundle to forward traffic. This technology also provides immediate failover: if one link in the group goes down, traffic is redistributed across the remaining links without recalculating STP. The creation of an EtherChannel requires consistent configuration across all member interfaces, including matching speed, duplex, allowed VLANs, and trunking mode. Cisco switches support manual EtherChannel as well as dynamic negotiation through PAgP or LACP, with LACP being preferred in environments where interoperability with other vendors is needed.
To configure EtherChannel you begin by selecting the interfaces that will participate and assigning them to a channel group. Once they are bound to a channel group, a logical port-channel interface is created automatically, and all configuration is applied to this interface rather than the physical interfaces. It is crucial to ensure that all physical members are configured identically, otherwise the bundle will fail to form. Verification is performed with the show etherchannel summary command, which provides a concise overview of the port-channel status and member links. When troubleshooting, pay attention to links that are suspended or not participating, as these usually indicate a mismatch in configuration or negotiation mode.
Traffic distribution in an EtherChannel is determined by a load balancing algorithm that can use source MAC, destination MAC, source IP, destination IP, or even Layer 4 port numbers as hashing criteria. The default method varies by platform but is often based on MAC addresses. In some cases, this may lead to uneven load distribution if only a few MAC addresses are actively sending traffic. Adjusting the algorithm to use IP-based load balancing or a combination of source and destination addresses often results in a more even spread of traffic, especially in routed environments. The configuration can be changed globally with the port-channel load-balance command, and it is a good practice to select an algorithm that reflects the traffic patterns of your network.
While EtherChannel addresses link redundancy, there remains the issue of gateway availability. End hosts require a default gateway to reach other networks, and if the switch providing that gateway fails, communication is lost. First Hop Redundancy Protocols solve this by presenting a single virtual gateway IP address shared between multiple devices. The hosts send their traffic to the virtual address, and the protocol ensures that one device is actively forwarding while another is ready to take over in case of failure.
HSRP is a Cisco proprietary FHRP that uses the concept of an active router and a standby router. The active router handles all the traffic directed to the virtual IP, while the standby router monitors hello messages and takes over if the active router becomes unavailable. Priority values determine which router should be active, and preemption allows a higher-priority router to reclaim its active status when it recovers from a failure. HSRP provides seamless failover, and from the host perspective, the gateway IP never changes, which makes the failover completely transparent. You can verify the HSRP state with the show standby command and observe which router is active and which is standby.
VRRP is an open standard alternative to HSRP, making it the preferred choice in multi-vendor environments. VRRP functions similarly to HSRP, with the concept of a master router that forwards packets and backup routers that take over if the master fails. A unique feature of VRRP is that the master router can use its physical IP address as the virtual IP, reducing IP consumption. Configuration is similar to HSRP and also allows priority and preemption settings to influence which router becomes the master.
GLBP is another Cisco proprietary protocol that goes beyond simple active-standby failover by providing load sharing across multiple gateways simultaneously. One router becomes the Active Virtual Gateway and is responsible for assigning virtual MAC addresses to up to four Active Virtual Forwarders. When hosts send ARP requests for the default gateway, the AVG replies with different virtual MAC addresses in a round-robin manner, effectively balancing the load across all participating routers. GLBP is a powerful solution when you want to use all available gateways instead of keeping one idle.
Modern enterprise networks use multilayer switches that combine the capabilities of traditional switches and routers. These devices can perform routing between VLANs at wire speed using specialized hardware such as ASICs and a switching mechanism known as Cisco Express Forwarding. Enabling inter-VLAN routing requires turning on IP routing on the switch and creating a Switch Virtual Interface for each VLAN, assigning it an IP address that will serve as the default gateway for hosts in that VLAN. Once SVIs are configured and VLANs are active, routing between VLANs happens automatically without the need for an external router. This design reduces latency and simplifies the network by eliminating router-on-a-stick configurations that can become a bottleneck.
Although the focus of the CCNP Switch exam is on Layer 2, it is important to understand that multilayer switches can run dynamic routing protocols such as OSPF and EIGRP to exchange routes with other devices. This allows for more scalable designs where distribution switches can participate fully in the routing domain. You may configure route summarization, filtering, and even policy-based routing on these switches, making them central elements of a modern enterprise network.
Troubleshooting at this level requires a systematic approach. When dealing with EtherChannel issues, confirm that all ports are in the correct channel group and that configurations match. The show etherchannel summary and show lacp neighbor commands will provide insight into which ports are active. For FHRP problems, verify that the correct priorities are configured, preemption is enabled if desired, and hello and hold timers match across devices. Use show standby or show vrrp to confirm the current active or master router. When troubleshooting inter-VLAN routing, ensure that SVIs are up by checking their status with show ip interface brief and that VLANs are not administratively shut down. If routing between VLANs does not work, check that IP routing is enabled globally and that the routing table contains the expected connected networks.
In an enterprise design, EtherChannel should be used not only between access and distribution layers but also between distribution and core layers to maximize bandwidth and eliminate single points of failure. Where possible, use LACP as it is standards-based and offers better detection of misconfigurations. Tune FHRP priorities so that the device with the most optimal uplink path becomes the active or master gateway. If using GLBP, monitor traffic flows to ensure that load sharing is balanced and adjust weighting if necessary. Finally, ensure that all configurations are documented and that failover scenarios are tested in a lab or maintenance window before deploying to production.
Modern enterprise networks face constant threats, both internal and external, which makes securing the network infrastructure as important as ensuring performance and redundancy. A single compromised port or misconfigured switch can expose the entire network to malicious attacks, data breaches, or service outages. Part 3 of this training course focuses entirely on hardening your switching environment. By the time you finish this section, you will know how to secure management access, control which devices connect to the network, prevent rogue DHCP servers from hijacking traffic, and protect ARP tables from poisoning attacks. Security is not a one-time configuration but an ongoing process that must be applied consistently to every access port, trunk, and management interface in your infrastructure.
The first step in hardening a switch is securing how administrators connect to it. Management plane protection ensures that only authorized users can configure the device and that all sessions are encrypted to prevent interception. The legacy use of Telnet is strongly discouraged because it sends credentials in plain text. Secure Shell or SSH should always be used instead. Enabling SSH requires generating RSA keys on the switch, setting up domain and host names, and creating local user accounts with privilege levels. Once SSH is enabled, you should disable Telnet on the VTY lines entirely, leaving only SSH as the permitted remote management protocol.
Role-Based Access Control, or RBAC, allows you to limit what commands a user can run based on their role. This is extremely useful in environments where different teams may require partial access to switches but should not be able to make critical configuration changes. Combining RBAC with AAA services gives you centralized control over authentication, authorization, and accounting. AAA can be implemented locally on the switch, but for enterprise-scale deployments, external servers such as Cisco ISE or TACACS+ servers are preferred. Using AAA ensures that all access is logged and that you can apply consistent policy across hundreds of switches.
Once management access is secured, you must control which devices are allowed to connect to access ports. Port Security is a feature that restricts the number of MAC addresses that can be learned on a switch port. For example, if you configure a port to allow only one MAC address, it will only permit the first device that connects. If another device attempts to connect, the switch can drop its traffic, restrict the port, or even shut it down entirely depending on the violation mode you select. Port Security can also use sticky learning, which records the dynamically learned MAC address into the running configuration, allowing you to save it later so that the configuration persists through reboots.
Port Security is a powerful feature, but it must be deployed carefully. For example, in environments with IP phones connected in series with PCs, you must allow enough MAC addresses on the port to account for both devices. Additionally, violation actions must be chosen to balance security with availability. A shutdown action offers maximum security by disabling the port when a violation occurs, but this could disrupt users if a legitimate device is swapped out. Restrict mode simply drops unauthorized frames and increments the violation counter, allowing the network to remain available.
One of the most common attacks on a switched network is the introduction of a rogue DHCP server that assigns incorrect IP addresses and gateways to hosts, potentially redirecting traffic to malicious destinations. DHCP Snooping is a feature that prevents this by classifying switch ports as trusted or untrusted. Trusted ports are typically uplinks to legitimate DHCP servers, while all other ports are untrusted. When DHCP Snooping is enabled, the switch will drop DHCP offers from untrusted ports, ensuring that only authorized servers can provide IP address assignments. The switch also builds a binding table of legitimate IP-to-MAC mappings, which can later be used by other security features such as Dynamic ARP Inspection.
ARP spoofing is another common attack where a malicious host sends falsified ARP replies to redirect traffic to itself. This can allow attackers to capture sensitive data or launch man-in-the-middle attacks. Dynamic ARP Inspection uses the DHCP Snooping binding table to verify that ARP packets contain valid IP-to-MAC address mappings. If an ARP packet does not match the trusted binding, it is dropped. DAI can also rate-limit ARP traffic to prevent ARP storms that could overwhelm the switch CPU.
Another feature that complements DHCP Snooping is IP Source Guard, which filters traffic based on the IP-to-MAC binding, effectively preventing IP spoofing. Storm Control is used to protect the switch from broadcast, multicast, or unknown unicast storms that could saturate the network. When traffic exceeds a configured threshold, the switch drops excess packets until the rate falls below the threshold. This prevents a single misbehaving host from flooding the network.
In environments where multiple hosts share a common VLAN but should not be able to communicate with each other, private VLANs can be implemented. This feature allows you to create isolated and community ports that restrict traffic flows, providing security segmentation even within the same VLAN. Private VLANs are commonly used in data centers to isolate servers or in service provider networks to separate customers sharing the same infrastructure.
The control plane of a switch is responsible for processing routing protocols, STP BPDUs, and management traffic. If the control plane becomes overwhelmed, the switch can stop forwarding packets, causing a denial-of-service condition. Control Plane Policing allows you to rate-limit or drop unwanted traffic directed to the CPU, ensuring that essential control traffic is not interrupted by malicious or excessive packets. Features like Storm Control at Layer 2 and CoPP at Layer 3 work together to protect the device itself.
Security is not complete without proper monitoring and logging. Syslog should be enabled to send switch logs to a central server for auditing. Simple Network Management Protocol can be configured securely using SNMPv3 to provide encrypted and authenticated monitoring of switch statistics. Network administrators should regularly review logs for port security violations, DHCP Snooping drops, and other anomalies that may indicate an attack or misconfiguration.
When troubleshooting security features, you must be aware of the common pitfalls. Port Security violations can leave ports in an error-disabled state that must be manually re-enabled or recovered using errdisable recovery commands. DHCP Snooping may block legitimate DHCP traffic if trusted ports are not configured properly. ARP inspection might inadvertently drop valid ARP packets if the binding table is stale or missing static bindings for statically configured devices. Careful verification using show commands for each feature is essential before deploying to production.
To create a secure network environment, always use SSH for remote access, enable AAA with centralized authentication where possible, limit physical port access with Port Security, prevent rogue DHCP servers with DHCP Snooping, enforce ARP integrity with Dynamic ARP Inspection, isolate sensitive hosts with Private VLANs, and monitor the network continuously for suspicious activity. Regularly update switch firmware to patch vulnerabilities and review configurations to ensure compliance with security policies.
Student Feedback
Similar Cisco Video Courses
Only Registered Members Can Download VCE Files or View Training Courses
Please fill out your email address below in order to Download VCE files or view Training Courses. Registration is Free and Easy - you simply need to provide an email address.
Log into your ExamCollection Account
Please Log In to download VCE file or view Training Course
Only registered Examcollection.com members can download vce files or view training courses.
SPECIAL OFFER: GET 10% OFF
Pass your Exam with ExamCollection's PREMIUM files!
SPECIAL OFFER: GET 10% OFF
Use Discount Code:
MIN10OFF
A confirmation link was sent to your e-mail.
Please check your mailbox for a message from support@examcollection.com and follow the directions.
Download Free Demo of VCE Exam Simulator
Experience Avanset VCE Exam Simulator for yourself.
Simply submit your e-mail address below to get started with our interactive software demo of your free trial.
Sometimes you don’t need an instructor who knows all the complex terms but just someone who makes you feel confident in your preparations for the certification exams.
The learning would’ve been more enjoyable if the labs were configured during the lesson rather than earlier. The content coverage was great though.
It’s not always that you get an instructor who knows to do his thing but still throws in a funny drill mid presentation to ease the learning. You can never be bored even when the topics turn from simple to complex.
Learning doesn’t need to be complicated. In this course, detailed explanations combined with Lab sessions makes one easily understand the concepts that are often tested in the certification exams.
The instructor breaks down complex concepts into easy to understand bits and this ultimately helps one to pass the CCNA R&S certification exam. The practical tips come in handy when one finally goes to the job market.