PRE-REQUISITE:
- Must have CCNA training or with Cisco work background
DURATION: 7 days training
9am - 5pm
56 hours
EQUIPMENTS PER STUDENT:
• 3 CISCO Router
• 3 CISCO Switch
• 1 ASA Firewall
• Fiber Optic Cable
• Serial WAN Cable
• CAT 6 Cable
Inclusion (face-to-face training): Lunch Meal
Certificate of completion
Training handout
Review material for exam
Free flowing coffee
Inclusion (Online Training): Certificate of completion
Training handout (soft copy)
Review material for exam
Explain the different design principles used in an enterprise network
• Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
• High availability techniques such as redundancy, FHRP, and SSO
Analyze design principles of a WLAN deployment
• Wireless deployment models (centralized, distributed, controller-less, controller based, cloud, remote branch)
• Location services in a WLAN design
Differentiate between on-premises and cloud infrastructure deployments
Explain the working principles of the Cisco SD-WAN solution
• SD-WAN control and data planes elements
• Traditional WAN and SD-WAN solutions
Explain the working principles of the Cisco SD-Access solution
• SD-Access control and data planes elements
• Traditional campus interoperating with SD-Access
Describe concepts of wired and wireless QoS
• QoS components
• QoS policy
Differentiate hardware and software switching mechanisms
• Process and CEF
• MAC address table and TCAM
• FIB vs. RIB
Layer 2
• Troubleshoot static and dynamic 802.1q trunking protocols
• Troubleshoot static and dynamic EtherChannels
• Configure and verify common Spanning Tree Protocols (RSTP and MST)
Layer 3
• Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)
• Configure and verify simple OSPF environments, including multiple normal areas, summarization, and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface)
• Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships)
Wireless
• Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client devices capabilities
• Describe AP modes and antenna types
• Describe access point discovery and join process (discovery algorithms, WLC selection process)
• Describe the main principles and use cases for Layer 2 and Layer 3 roaming
• Troubleshoot WLAN configuration and wireless client connectivity issues
Network Assurance
Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog
Configure and verify device monitoring using syslog for remote logging
Configure and verify NetFlow and Flexible NetFlow
Configure and verify SPAN/RSPAN/ERSPAN
Configure and verify IPSLA
Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management
Configure and verify NETCONF and RESTCONF
Virtualization
Describe device virtualization technologies
• Hypervisor type 1 and 2
• Virtual machine
• Virtual switching
Configure and verify data path virtualization technologies
• VRF
• GRE and IPsec tunneling
Describe network virtualization concepts
• LISP
• VXLAN
Security
Configure and verify device access control
• Lines and password protection
• Authentication and authorization using AAA
Configure and verify infrastructure security features
• ACLs
• CoPP
Describe REST API security
Configure and verify wireless security features
• EAP
• WebAuth
• PSK
Describe the components of network security design
• Threat defense
• Endpoint security
• Next-generation firewall
• TrustSec, MACsec
• Network access control with 802.1X, MAB, and WebAuth
Automation
Interpret basic Python components and scripts
Construct valid JSON encoded file
Describe the high-level principles and benefits of a data modeling language, such as YANG
Describe APIs for Cisco DNA Center and vManage
Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF
Construct EEM applet to automate configuration, troubleshooting, or data collection
Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack
IP Services
Describe Network Time Protocol (NTP)
Configure and verify NAT/PAT
Configure first hop redundancy protocols, such as HSRP and VRRP
Describe multicast protocols, such as PIM and IGMP v2/v3
Layer 3 technologies
Configure and verify policy-based routing
Configure and verify VRF-LiteConfigure and verify VRF-Lite
Configure and verify infrastructure security features
VPN Technologies
Describe MPLS operations (LSR, LDP, label switching, LSP)
- Explain MPLS
- When & Where to use MPLS
- Discuss the advantages &
disadvantages of MPLS
Configure and verify DMVPN (single hub)
- What is DMVPN GRE/mGRE
- Differentiate DMVPN
GRE/mGRE to other VPN
technologies
- Design & configure DMVPN
GRE/mGRE
Configure and verify DMVPN NHRP
- What is DMVPN NHRP
- Differentiate DMVPN
NHRP to other VPN
technologies
- Design & configure DMVPN
NHRP
Configure and verify DMVPN IPSEC
- What is DMVPN IPSEC
- Differentiate DMVPN
IPSEC to other VPN
technologies
- Design & configure DMVPN
IPsec