Online Courses
- 1. Cisco Certified Network Associate - CCNA 200-301
- 2. CCNP ENTERPRISE – Core 350-401
- 3. CCNP ENTERPRISE – Advanced Routing 300-410
- 4. CCNP ENTERPRISE – SDWAN 300-415 – WAN Automation
- 5. SD-ACCESS – Cisco DNAC- LAN Automation
- 6. CCNP SECURITY - 350-701 Security Core
- 7. CCNP SECURITY - 300-730 Virtual Private Networks (VPN)
- 8. CCNP SECURITY - 300-710 Firepower + NGIPS
- 9. CCNP SECURITY – Web /Email Security (300-720/725)
- 10. CCNP SECURITY - 300-715 Identity Service Engine (ISE)
- 11. CCNP SERVICE PROVIDER – 350-501 Core
- 12. CCNP SERVICE PROVIDER – 350-510 Advanced Routing
- 13. CCNP SERVICE PROVIDER – 300-515 VPN Services
- 14. CCNP DATACENTER – 350-601 Core
- 15. CCNP DATACENTER – 300-620 ACI (Application Centric Infrastructure)
- 16. CCNP DATACENTER – Nexus
- 17. CCIE ENTPERISE INFRASTRUCTURE
- 18. CCIE Security
- 19. CCIE Service Provider
- 20. JNCIA - Enterprise Routing and Switching (JN0-102)
- 21. Cisco ASA firewall / Cisco Firepower-
- 22. Checkpoint Firewall (CCSA)
- 23. Fortigate Firewall (NSE 4-5 )
- 24. PaloAlto Firewall
- 25. F5 Load balancers – LTM
- 26. Python Programming – for Network Engineers
- 27. CCNA Devnet – 300-901
- 28. Cisco Ansible- Automating networks
- 29. Microsoft Certified Engineer ( MCSE 2016)
- 30. Vmware Vsphere 6.5
- 31. AWS Solutions Architect
- 32. Microsoft Azure Administrator
CCIE ENTPERISE INFRASTRUCTURE
Duration – 6 Months
Price – 90,000 INR ( 1200 USD )
DEMO VIDEO (YouTube links)
Training Program Includes
Contact us to reserve your slot for Online Trainings
For more Details Mail us on info@noasolutions.com
Faster communication – WhatsApp – +91 7036826345
Course Content
CCNP CCIE ENTEPRISE – Core Technology + Lab Preparation
Instructor - Sikandar Shaik CCIEx3
- Core Technology Training – 10 Days
- Lab exam preparation – 4 Days
- Duration – 8 – 10 hrs/day ( Theory /Labs )
Training / Support till you pass CCIE LAB / or 6 months after Training
Training Program Includes •
===============================
1. Live Training by Sikandar Shaik CCIEx3
2. Pre-recorded Videos – for future reference.
3. Detailed lab Workbooks (slides/Labs)
4. Virtual Lab setup for LAB PRACTICE
============================================
COURSE CONTENT
CCNP Certifications - Overview
- About Cisco
- Cisco Certification Updates
- Cisco Re-Certification
- CCNP Certifications
- CCIE Certifications
- Cisco Certification Migration Options
- Required Exams for CCNP
ENCOR 350-401 Course Content
- CCNP ENCOR-350-401
- CCNP ENCOR-Contents
CCNP Labs- Setup - GNS3
- Cisco Lab Options
- About GNS3
- Installing GNS3 on Windows
- GNS3 - Adding IOS Images
- Default Topology- IOS Routers -Initial Configurations
- IOS Default Topology
- Connecting GNS3 Topology to Host Computer
- GNS3- VMWARE Integration
- GNS3 - IOSv L2-L3 Configuration Steps
- GNS3 - ASAv Setup
- GNS3- IOU- L2-L3 Configuration Steps
Basic Switching
- Local Area Network
- Ethernet
- SOHO LANs
- Enterprise LAN
- Transmission Media - UTP cables
- Fiber Cables - Wireless
- Basic LAN Setup
- Address Resolution Protocol - ARP
Virtual LAN (VLAN)
- What is Broadcast Domain
- What is VLAN
- VLAN Types
- VLAN Ranges
- Creating VLANs
- VLANs- Assigning Ports
- VLAN-Design
- Voice VLAN
- 009 Management VLAN
Trunking VLANs
- VLANs- Multiple Switches
- Trunk Links
- Access- Trunk Links
- 802.3 Ethernet Frame Format
- Frame tagging - on Trunk Links
- Trunking Protocols - ISL-DOT1Q
- Trunk Link - Configuration
Inter-VLAN Routing
- Forward Packets between VLANs
- VLAN Routing - Methods
- VLAN Routing- Physical Gateways
- VLAN Routing -Physical Gateway - Configuration
- VLAN Routing Physical Gateway- Limitations
- VLAN Routing - Sub interfaces
- VLAN Routing - Sub interfaces - Configuration - PART 1
- VLAN Routing- Sub interfaces -PART 2
- VLAN Routing Sub Interfaces - Advantages - Disadvantages
- VLAN Routing – SVI – L3 Switch
- SVI- Configurations
- SVI - Multiple Switches
- L3 Routed Ports
VLAN Trunking Protocol - VTP
- What is VTP
- VTP Modes
- VTP-configuration
Spanning Tree Protocol (STP)
- Bridging loops with Redundant links
- Bridging Loops - STP
- How STP Works
- Selecting Root Bridge
- Root Bridge - Verification
- Root Port Selection- PART 1
- Root Port Selection- PART 2
- STP till now - Review
- Selecting Designated Ports
STP Terminology
- Root Port -VS- Designated Ports
- STP – Hello BPDUs
- STP Convergence
- STP Timers
- STP Interfaces States
STP Tuning
- Hierarchical Campus model
- Selecting Root Bridge -STP
- Tuning STP Cost-Priority - Timers
- EtherChannel - Port Channel
- 704 Spanning Tree Port Fast
- Rapid Spanning Tree Protocol - RSTP
- STP Convergence
Rapid STP /Multiple STP – RSTP & MSTP
- RSTP Port Roles
- RSTP BPDU
- Per VLAN STP (PVST) - Multiple STP (MSTP)
- Per VLAN STP - PVST
- MSTP Lab Verification
- Tuning MSTP Port Priority - Cost
Switch Port Analyzer - SPAN-RSPAN_ERSPAN
- SPAN - Switch Port Analyzer
- SPAN - Configuration Example
- Remote Switch Port Analyzer - RSPAN
- RSPAN - Example
- Encapsulated Remote SPAN - ERSPAN
- SPAN Conditions and Restrictions
Static -Default Routing
- Routing- Introduction
- Static Routing
- Static Routing Lab
- Static Routing- 3 Routers
- Default Routing
- Verify Default Routing
- Routing Table Lookup
- Building Routing table
- Floating Static-Default Routing - PART 1
- Floating Static-Default Routing - PART 2
Open Shortest Path First - OSPF
- Knowledge - Prerequisite (2:01)
- OSPF - Overview (6:12)
- OSPF - How it Works (3:28)
- OSPF – Becoming Neighbors (11:04)
- OSPF - LSDB- Database (5:18)
- Exchanging the LSDB (6:26)
- Router-ID (12:40)
- Maintaining Neighbors - LSDB (7:35)
- Synchornize LSDB- Best Route (4:57)
- OSPF -Tables (2:31)
OSPF Configuration - Single Area
- OSPF Configuration Syntax (8:15)
- OSPF - Wild Card Mask (9:14)
- OSPF Single Area - Pre-Requisite (2:30)
- OSPF Single Area-Configuration (6:59)
- OSPF - Single Area- Verification (8:52)
- OSPF - Advertisement Example (4:07)
OSPF Metric - COST
- Calculate Best Routes - OSPF (5:48)
- OSPF Metric - COst (5:59)
- Changing Interface Bandwidth (5:49)
- Default Reference BW- Limitations (1:25)
- Manual Cost (3:49)
- Auto-Cost Reference BW (6:04)
OSPF Multiple Areas
- OSPF Single Area - Limitations (7:13)
- MUltiple Areas (7:05)
- MUlti-Ares -Design Rules (14:31)
- Multi-Area - Configurations (5:05)
- LAB - Mutl-Area- Configuration (11:51)
- OSPFv2 Interface SubCommands (9:33)
OSPF Network Types
- OSPF Network Types (7:29)
- OSPF Broadcast Networks- DR-BDR (9:40)
- DR-BDR - Elections (9:12)
- OSPF DR-BDR - Lab (12:48)
- OSPF Point to Point LInks (8:52)
Default Route Advertisements - OSPF
- OSPF Default Routes Advertisements (3:32)
- Advertising Default Routes -IGP (8:45)
- OSPF Default Route- LAB (12:54)
- OSPF Default Routes - Options (9:52)
OSPF Advance
- OSPF virtual links (9:40)
- LAB OSPF virtual links (17:10)
- OSPF LSA Types (16:31)
OSPF STUBS
- OSPF Stubs-Introduction (10:56)
- LAB-OSPF Stubs (19:18)
- OSPF Totally STUB (5:45)
- LAB-OSPF Totally STUB (7:53)
- Not-so-stubby Area - NSSA (7:38)
- LAB-Not-so-stubby Area - NSSA (16:07)
- Totally Not-so-Stubby Area - Totally NSSA (9:39)
- 1408 Quick Review (4:35)
OSPF Enhancements
- OSPF Graceful Shutdown (7:04)
- OSPFv3 Address-family support (16:26)
- OSPF TTL security (8:45)
- OSPFv2 Authentication Enhancements (7:54)
EIGRP Routing Protocol
- EIGRP (5:14)
- EIGRP - How it works (5:39)
- Verify EIGRP Process (5:17)
- EIGRP Tables (5:42)
- EIGRP Convergence (3:45)
- Metric Path Calculation - 1 (13:41)
- Metric Path Calculation - 2 (9:41)
- EIGRP Configuration (14:00)
- Successor- Feasible Successor (5:31)
- Feasible - Reporting Distance (11:38)
- Feasibility Condition (8:55)
EIGRP Optimization
- EIGRP Load Balancing-Equal cost (10:07)
- EIGRP Load Balancing-Unequal cost (15:54)
- EIGRP Stuck-in-Active (4:31)
- EIGRP Stub (5:45)
- EIGRP Summarization-Leak map (13:15)
EIGRP Name Mode
- EIGRP Name Mode (6:07)
- EIGRP Name Mode- Routing-IPv4-v6 (19:44)
- EIGRP Name Mode-Authentication (12:55)
- EIGRP Wide Metric (8:14)
IPv6
- IPV6- Introduction (8:46)
- IPv6 Addressing (6:35)
- IPV6 Address types (17:09)
- IPV6 Static Addressing (10:43)
- IPv6 Static-Default Routing (13:21)
- OSPFv3 (13:43)
- EIGRP-IPv6 (14:57)
Redistribution IPv4 - IPv6
- Redistribution-Introduction (9:24)
- EIGRP- RIP-Redistribution (13:16)
- OSPF RIP Redistribution (15:39)
- OSPF EIGRP Redistribution (5:15)
- Redistribution -Mock lab (19:25)
- EIGRP6- OSPFv3 Redistribution (7:42)
Summarization IPv4 - IPv6
- Summarization (9:44)
- Summarization - Advantages (3:32)
- Auto-Summary (8:24)
- AutoSummary-Verification (6:00)
- Manual Summary (3:20)
- Calculate Summary Address- EX-1 (9:02)
- Calculate Summary Address- EX-2 (2:32)
- Calculate Summary Address- EX-3 (2:19)
- Summarization Conditions (10:13)
Summarization (11:24)
- Summarization - NULL 0 (15:34)
- OSPF Summarization LAB (15:12)
- EIGRP6 Summarization (8:22)
- OSFv3 Summarization (11:12)
Routing Protocol Authentication
- Routing Protocol Authentication (7:12)
- EIGRP-Authentication (9:24)
- OSPF-Authentication (4:38)
- LAB-OSPF-Inteface-based-Authentication (13:35)
- OSPF Area-based-Authentication (6:46)
- OSPF Virtual link-Authentication (15:27)
- OSPFv3 Authentication (8:11)
Route Filtering
- Route Filtering - Introduction (10:11)
- Passive Interface (12:42)
- LAB-Verify Passive interface (14:40)
- Distribution-Lists (8:36)
- LAB-Distribution List (13:28)
- IP Prefix-Lists (9:48)
- LAB-Verify Prefix-list- PART 1 (15:45)
- LAB-Verify Prefix-list- PART 2 (14:54)
Route-MAPS
- Route-Maps-Introduction (8:24)
- LAB-Route-MAPS - PART 1 (9:04)
- LAB-Route-MAPS - PART 2 (13:37)
- Route-filtering using Route-MAPS (11:05)
Policy Based Routing- PBR
- Policy Based Routing (10:51)
- PBR based on Source (17:07)
- PBR based on destination (12:35)
- PBR based on Services (9:11)
- PBR based on Packet size (7:37)
Border Gateway Protocol - BGP
- Border Gateway Protocol - Introduction (14:22)
- BGP options connecting to Internet (17:32)
- When BGP is more Appropriate (10:23)
BGP Neighbors - IBGP
- Understanding BGP neighbors - IBGP- EBGP (10:50)
- IBGP neighbors -LAB (16:46)
- BGP Split Horizon Rule (10:35)
- IBGP Neighbors using Loopback-LAB - PART 1 (18:05)
- IBGP Neighbors using Loopback-LAB - PART 2 (17:12)
BGP Neighbors - IBGP - Advance
- BGP Neighbors - Authentication (7:31)
- BGP Neigbors - using PeeGroups (11:42)
- IBGP neighbors - with Route Reflectors (19:26)
External BGP - IBGP
- Basic EBGP configuration (7:55)
- BGP Next-hop-Self (17:48)
- EBGP using loop-back -EBGP Multi-Hop (16:41)
- BGP synchronization Rule (11:34)
BGP Attributes
- Understanding BGP Attributes (9:56)
- ASPATH -ORIGIN- NEXTHOP Attributes (17:47)
- WEIGHT & LOCAL PREFERENCE Attributes (12:35)
BGP Weight and Local Preference Attributes
- Path Manipulation using WEIGHT Attribute - PART 1 (14:10)
- Path Manipulation using WEIGHT Attribute - PART 2 (6:48)
- WEIGHT using ROUTE_MAPS-LAB (17:00)
- Understanding IN OUT (7:09)
- BGP Attribute - Local preference (18:29)
- Local Preference with Route-maps (14:38)
- BGP path selection Process (16:09)
- Clear ip bgp sessions (17:07)
IPv6-BGP
- IPv6 BGP Introduction (5:38)
- IPV6 IBGP- EBGP Configuration (14:30)
- IPV6 PeerGroups and Route Reflectors (13:38)
- IPV6 EBGP Multi-hop (16:48)
- IPV6 IPV6 BGP path Manipulation (9:51)
Virtual Private Networks - VPN
- VPN-Introduction (5:09)
- VPN Types (3:49)
- VPN Logical Topologies (1:25)
- VPN Default Lab Setup- Routers (5:22)
GRE - Generic Routing Encapsulation
- VPN over Internet (4:37)
- Generic Routing encapsulation (7:33)
- LAB- GRE point to point Configuration (7:11)
- LAB- GRE point to point Configuration Advance (7:41)
- Drawbacks of GRE (4:38)
Dynamic Multipoint VPN - DMVPN
- DMVPN - Introduction (7:15)
- DMVPN-Protocols (4:07)
- DMVPN - mGre Tunnels (3:27)
- DMVPN-NHRP Protocol - Messages (11:00)
- VPN Default Lab Setup- Routers (5:22)
- DMVPN-Basic Tunnel Configuration Example (15:27)
- EIGRP Routing over DMVPN (9:37)
DMVPN Phase 1
- DMVPN- Phases 1-2-3 (10:06)
- DMVPN Phase 1 - Tunnel Configuration (8:35)
- DMVPN-Phase1 -EIGRP Routing (9:17)
- DMVPN-Phase1 -OSPF Routing (7:57)
DMVPN Phase 2
- DMVPN Phase 2-Tunnel Configuration (5:13)
- DMVPN Phase 2-OSPF Routing (11:04)
- DMVPN Phase 2-EIGRP Routing (15:40)
DMVPN Phase 3
- DMVPN Phase 3 -Overview (5:52)
- DMVPN Phase 3- Tunnel Configuration (1:47)
- DMVPN Phase 3- EIGRP Routing (7:48)
- DMVPN Phase 3- OSPF Routing (4:52)
IPSEC - Introduction
- what is IPSEC ? (2:48)
- IPsec Security Services (6:53)
- IPsec Modes - Tunnel vs Transport (5:29)
IPSEC Site to Site VPN
- How IPsec VPN works (5:19)
- Step-1 Interesting Traffic Configuration (3:02)
- Step-2 IKE Phase-1 (7:36)
- Step-3- IKE - Phase 2 (8:30)
- IKE Phase -2 Configuration- Verification (6:56)
IPSEC over DMVPN
- IPSEC VPN - Limitations (4:59)
- IPSec over DMVPN (3:19)
- LAB - IPSec Over DMVPN (11:17)
MPLS VPN - Introduction
- VPN models overview (13:45)
- VPN models -Advantages and Disadvantages (6:51)
- Cisco express forwarding (10:51)
- MPLS VPN overview (7:54)
MPLS VPN - Cisco Express Forwarding
- MPLS VPN - Introduction (17:47)
- Layer 3 Process switching - CEF (5:52)
- Identify Network Device Planes (2:44)
- Data Plane (6:09)
- Control Plane (3:27)
- Management Plane (2:31)
- Cisco Express Forwarding - CEF (6:44)
- CEF in MPLS Networks (3:57)
MPLS - Label Distribution Protocol
- MPLS – Label Distribution Protocol (2:08)
- Configuring LDP – MPLS Core (18:54)
- How LDP Label forwarding Works (4:21)
- MPLS LDP - Verification (10:48)
- MPLS LDP Troubleshooting (19:50)
- Penultimate hop popping – PHP (8:54)
MPLS - VRF - RD - RT
- VRF -Virtual Routing and Forwarding (7:56)
- RD - Route-Distinguisher (8:00)
- RT - Route Target (9:03)
- RD vs RT values (7:21)
- VRF, RD, RT – Configuration (11:48)
MPLS L3 VPN - 6 Steps
- MPLS L3 VPN -Configuration Steps (11:58)
- Routing PE- CE – RIPv2 (10:35)
- Multi-Protocol -BGP (8:48)
- VPNv4 -Peering PE-PE (21:40)
- Redistribution on PE Routers (13:04)
- MPLS L3 VPN - LSP Verification (5:55)
MPLS L3 VPN - Routing Options
- MPLS L3 VPN - Configuration Steps - Review (6:14)
- MPLS L3 VPN - EIGRP PE-CE Routing (16:28)
- MPLS L3 VPN - Static-Default -PE-CE (11:04)
- MPLS L3 VPN - BGP Routing -PE-CE (17:12)
- MPLS L3 VPN - OSPF Routing -PE-CE (12:45)
MPLS L3 VPN Advance Options
- Overlapping VPNs (9:08)
- Overlapping VPNs- Continued (11:37)
- Overlapping VPN- Advance (17:50)
- Layer 2 MPLS VPN- Overview (11:37)
- -IPV6 support - MPLS (4:40)
- -MPLS Traffic Engineering- overview (8:34)
- Inter AS VPN overview (3:22)
MPLS L3 VPN Troubleshooting
- MPLS L3 VPN- Troubleshooting (11:38)
- MPLS L3 VPN- Troubleshooting-Continued (17:05)
Threat Defense Technologies
- What is Firewall
- Next Generation Firewalls
- AAA- Network Security
- Cisco Traffic Telemetry methods
- Virtual Private Networks
- Web Access-Possible Threats
- Web Traffic-Security
- Cisco Web Security - WSA - CWS
- Email Based Threats
- Cisco Email Security - ESA - CES
- Intrusion Prevention System - IPS
Network Infrastructure Protection
- Network Infrastructure Protection
- Identify Network Planes
- Data Plane
- Control Plane
- Management Plane
Remote Management - TELNET -SSH
- Inband vs OutBand
- Remote Access - Telnet
- Remote Access - SSH
AAA - Authentication-Authorization-Accounting
- AAA- Network Security (10:37)
- AAA - Components (3:50)
- AAA - Protocols -TACACS- RADIUS (7:35)
- AAA - Cisco Authentication Servers (3:51)
AAA - Authentication
- AAA Authentication - Device Access (2:54)
- Authentication - Local Database (9:54)
- AAA - External Servers (3:19)
- LAB- Authentication - TACACS (11:34)
AAA Authorization
- Authorization - Device Access (3:27)
- IOS Privilege Levels (8:48)
- LAB -Local Authorization- Privilege Levels (14:23)
- IOS Privilege Levels - Limitations (4:57)
- Role based CLI Access - RBAC (5:33)
- RBAC - Views Types (4:22)
- LAB1- RBAC Views (9:44)
- LAB2 - Modify RBAC Views (3:39)
- LAB3 - RBAC Views (5:42)
- LAB4 - RBAC Super Views (5:13)
DHCP -Dynamic Host Configuration Protocol - IPv4 - IPv6
- DHCP-Overview (7:25)
- Router as DHCP server (11:19)
- DHCP Relay Agent (13:34)
- DHCPv6 Configuration (9:59)
- DHCPv6 Relay Agent (10:07)
Cisco Telemetry Services
- Cisco Traffic Telemetry methods
- Device-Network Events Logging
- Syslog - Terminal Logging
- Network Time Protocol
- NTP -Stratum Value
- LAB - NTP - Configuration
Cisco Telemetry Services
- Cisco Traffic Telemetry methods (3:38)
- Device-Network Events Logging (9:39)
- Syslog - Terminal Logging (6:48)
- Network Time Protocol (7:01)
- NTP -Stratum Value (3:40)
- LAB - NTP - Configuration (8:45)
- SNMP - Simple Network Management Protocol (18:05)
- IP Service Level Agreement (9:50)
- IP SLA Configuration example (11:51)
Access Control Lists- ACL
- Access Control Lists (12:02)
- ACL Types (2:38)
- Standard - Extended ACL (9:34)
- ACL Logic- How Match Rules (8:38)
Standard ACL
- Standard ACL lab - Prerequisite (6:03)
- Standard ACL Lab (4:42)
- ACL - Wild Card Mask (11:21)
- ACL Statements- Things to Know (8:45)
- Standard ACL - Configuration (10:54)
- Apply ACL - Select Right Interface (10:17)
- Standard ACL- IN- OUT (10:45)
- Standard ACL - Verification (6:22)
- Standard ACL- Wrong Direction (5:32)
- Standard ACL - Practice Examples (8:03)
- Standard ACL- Find IP-Ranges (10:32)
Extended ACL
- Extended ACL (3:59)
- Extended ACL- Lab Pre-Requisite (8:23)
- Extended ACL - Config Example (1:49)
- Similarities- Extended - Standard ACL (3:27)
- Extended ACL- Things to Know (8:31)
- Extended ACL- Syntax (11:00)
- Extended ACL- Configuration (10:30)
- Extended ACL-Apply - Verify (13:13)
- Extended ACL - Examples (13:23)
Named ACL
- Named ACLs (10:42)
- Named ACL- Syntax (5:35)
- Named Standard ACL - Configuration (2:04)
- Named Extended ACL - Configuration (1:24)
- Editing Named ACLs (8:55)
- Time based ACL (13:27)
- IPv6 ACL (19:42)
Control Plane Security
- Control Plane - Possible Threats (8:32)
- Routing Protocol Authentication (11:50)
- Control Plane Policing -CoPP (7:11)
- Class map -Policy map -Hierarchy (5:23)
- CoPP_ Configuration Example (12:14)
IPv6 First Hop Security
- IPV6 Layer 2 Options (11:07)
- IPv6 First hop security-Introduction (4:49)
- IPv6 RA Guard (7:39)
- DHCPv6 Guard (5:16)
Zone Based Firewall - ZBF
- IOS - Zone based Firewall
- ZBF- Configuration overview
- ZBF- Security Zones
- ZBF - Default Traffic flow
- Class Map -Policy Map -Hierarchy
- ZBF - Classify Traffic using Class-maps
- ZBF- Class-map Configuration
- ZBF- Policy map- Zone Pairs
Virtual Private Networks - VPN
- VPN-Introduction
- VPN Types
- VPN Logical Typologies
- VPN Default Lab Setup- Routers
GRE - Generic Routing Encapsulation
- VPN over Internet
- Generic Routing encapsulation
- Default Lab setup
- LAB- GRE point to point Configuration
- LAB- GRE point to point Configuration Advance
- Drawbacks of GRE
Dynamic Multipoint VPN - DMVPN
- DMVPN - Introduction
- DMVPN-Protocols
- DMVPN - mGre Tunnels
- DMVPN-NHRP Protocol - Messages
- VPN Default Lab Setup- Routers
- DMVPN-Basic Tunnel Configuration Example
- EIGRP Routing over DMVPN
What is IPSEC ?
- What is IPSEC
- IPsec Security Services
- IPsec Modes - Tunnel vs Transport
IPSEC Site to Site VPN
- How IPsec VPN works
- Step-1 Interesting Traffic Configuration
- Step-2 IKE Phase-1
- Step-3- IKE - Phase 2
- IKE Phase -2 Configuration- Verification
Network Address Translation -NAT
- NAT- What we Cover
- Why do we need NAT
- What is NAT
- NAT Types
- NAT - Lab Setup
- Static NAT - LAB
- Dynamic NAT- LAB
- PAT- LAB
- PAT with Exit Interface
First Hop Redundancy Protocols (FHRP)
- First Hop Redundancy Protocols - Overview
- FHRP Protocols - HSRP - VRRP - GLBP
- HSRP lab - Basic Configuration
- HSRP lab - Advance Configuration
- HSRP Load sharing using Multiple Groups
- VRRP Configuration LAB
- GLBP Configuration LAB
- GLBP - Tracking and Load Balancing
IP Service Level Agreement - IP SLA
- IP SLA Configuration Example
- IP Service Level Agreement
IP Multicasting
- Multicasting - Overview
- Multicast-Benefits
- How Multicast works
- Multicast IP Ranges
IGMP - PIM Protocols
- IGMP Protocol and Versions
- Protocol independent Multicast
- PIM Modes -Trees
- Dense mode - Configuration
- RPF check _ loop prevention
PIM Sparse Mode - Rendezvous Point
- PIM sparse-mode Operation
- Sparse-Mode Configuration
- Static RP
- Auto-RP
- Auto-RP Configuration
- Auto-RP Redundancy
- Auto-RP Load Sharing
- PIM-Bootstrap Router
Quality of Service (QoS)
- Quality of Service (QoS) - Overview
- QoS - MQC configuration
- Quality of Service (QoS) Mechanisms
- QoS Models
Classification & Marking
- Classification and Marking
- Layer 2 & Layer 3 Marking
- Classification & Marking - Configuration Example
Congestion Management - Queueing
- Queuing - Overview
- Legacy Queuing Mechanisms
- 603 Weighted fair Queuing
- Class Based Weighted Fair Queuing
- Low Latency Queuing
QoS - Congestion Avoidance
- Congestion Avoidance- Introduction
- WRED-CBWRED
- CBWRED-configuration
- Traffic Policing - Shaping
- Traffic Policing and Shaping
What is Network Mangement ?
- What is Network Management
- Past-Present Methods of Network Management - PART 1
- Past-Present Methods of Network Management - PART 2
- SNMP - Simple Network Management Protocol
What is Network Automation ?
- Challenges - Traditional Management
- Network Automation- Goals
- Types of Network Automation
- What can be Automated- PART 1
- What can be Automated - PART 2
- Impact of Network Automation
Software Defined Networking - SDN & SDN Controllers
- Automation Origination Points
- SDN- Software Defined Networking
- SDN Controllers
- Networks Managed by SDN Controllers
SDN-Control - Management - Data Planes
- Identify Network Device Planes
- Identify Network Device Planes
- Data Plane
- Control Plane
- Management Plane
- Control Plane- Data Plane
- SDN- management Plane
SDN Models - Architecture
- SDN - Imperative Model
- SDN - Declarative Model
- SDN-Network Design Requirements
- Underlay Networks
- Overlay Networks
- SDN Fabric
Application Programming Interface - API
- API - Application Programming Interface
- API - Types
- API - with SDN Networks
- NorthBound API
- SounthBOund API
Cisco DEVNET- SANDBOX
- Cisco DEVNET
- DevNET Certifications
- DevNET SandBox
- Sandbox LABS
- Sandbox Lab Access-Reservations
Cisco DNA Center
- Cisco DNA Center
- DNA Center Appliance
- DNA Center- What can do - PART 1
- DNA Center- What can do - PART 2
Application Programming Interface - API
- Web Service API
- Web Service API - Commonly Used
- REST API
Network Automation Tools
- Config MGMT Tools
- Config MGMT Tools - Capabilities
- Config-MGMT tools - Similarities
- Master - Agent
- Agent based- Agentless
- Push-Pull Model
- Configuration Files
PUPPET Config Management Tool
- PUPPET-Tool
- Puppet Master-Agent-Database
- Puppet-Manifest
- Puppet-Module-Forge
- Puppet Agent-Agentless
- Puppet- PULL Model Steps
CHEF Config Management Tool
- CHEF-Terminology
- CHEF- Config MGMT Tool
ANSIBLE Config MGMT Tool
- ANSIBLE-Tool
- ANSIBLE-Control Station
- ANSIBLE -PLayBook-Inventory
- ANISBLE - Templates-Variables
JSON DATA Encoding
- API Data Formats
- JSON Overview
- JSON Data Types
- JSON Syntax Rules
- JSON Data Interpretation
Wireless LAN Foundations -WLAN
- Wired vs Wireless Networks
- Types of Wireless Networks
- WLAN Devices - AP-WLC
- Ad-HOC vs Infrastructure Mode
Service Sets - SSID-BSS-ESS
- SSID-Service Set Identifier
- Service Sets - Types
- Independent Basic Service Set - IBSS
- Basic Service Set -BSS
- Extended Service Set- ESS
- Distribution System
RF - WLAN Standards
- Wireless Signal Basics
- Frequency - Ranges
- IEEE- 802 Standards
- 802.11 - Wireless LAN Standards
- 802.11 - a - b - g
- 802.11 n
- 802.11 ac
- 802.11 ax
Wireless Architecture - WLC Deployments
- Wireless Architectures
- Autonomous AP - Architecture
- Autonomous AP - Challenges
- Split-MAC Architecture- Lightweight AP
- LAP-WLC Binding
- CAPWAP Tunnels
- CAPWAP Messages
- WLC Deployments Methods
Trouble Shooting - Routing Pre-requisite
- Troubleshooting - Routing- Pre-requisite (16:40)
- Troubleshoot - WAN Connectivity - PART 1 (11:50)
- Troubleshoot - WAN Connectivity - PART 2 (10:58)
Troubleshooting - Static Routing
- Troubleshoot - IPv4 Static Routing (17:01)
- Trouble Ticket - IPv4 Static Routing (18:01)
- Troubleshoot - IPv6 Static Routing (9:56)
- IPv6 Static Routing - Trouble Ticket (8:35)
Troubleshoot - EIGRP Neighbors
- EIGRP interface Down (7:12)
- EIGRP AS-Number Mismatch (3:59)
- Incorrect Network Statements (6:38)
- Neighbors on Different Subnets (6:31)
- Authentication Mismatch (9:22)
- K-Values Mismatch (5:10)
- Passive-Interface issue (4:33)
- ACL Dropping EIGRP (8:00)
- Timers Mismatch (3:14)
Troubleshoot - EIGRP Route Exchange
- Troubleshoot EIGRP Routes - Interface down (6:00)
- Missing Network Statements (4:38)
- Better Source Routing update (8:15)
- Route Filtering Issues (8:18)
- Stub Configuration Problem (5:03)
- Split Horizon Issues (3:59)
EIGRP Trouble Tickets
- EIGRP Trouble Ticket 2 (10:33)
- EIGRP Trouble Ticket 1 (11:01)
- EIGRP Trouble Ticket 3 (7:58)
- EIGRP Trouble Ticket 4 (6:39)
- EIGRP Trouble Ticket 5 (12:10)
Troubleshoot - OSPF Neighbors
- Troubleshoot OSPF - Subnets - Interface status (8:50)
- Advertisements - Area Mismatch (6:07)
- Timers Mis-Match (3:38)
- Authentication Mismatch (5:40)
- OSPF Passive Interface (4:43)
- ACL Dropping OSPF Packets (6:45)
- MTU Mismatch (3:41)
- Duplicate Router -ID (3:20)
- Network Types - Mismatch (5:40)
- Stub Flag Mismatch (6:00)
Troubleshoot - OSPF Route Exchange
- Troubleshoot OSPF Routes - Interface down -Not Advertised (11:56)
- Duplicate Router-ID (7:24)
- Better Source Routing information (4:51)
- Route Filtering issue (7:20)
- Stub Configuration Issue (3:01)
- Wrong DR Elections (5:07)
OSPF Trouble Tickets
- OSPF Trouble Tickets 1 (11:10)
- OSPF Trouble Tickets 2 (9:29)
- OSPF Trouble Tickets 3 (10:51)
- OSPF Trouble Tickets 4 (7:53)
- OSPF Trouble Tickets 5 (9:14)
- OSPF Trouble Tickets 6 (10:08)
- OSPF Trouble Tickets 7 (9:56)
Troubleshooting - BGP Neighbors
- BGP Troubleshooting - Neighbors (11:09)
- Incorrect Neighbor Statement (9:23)
- L3 Connectivity Issues (11:11)
- L3 Reachability - Via Default Route (2:40)
- BGP Source Address issue (2:19)
- Mismatch Authentication (4:37)
- ACL-Firewall Blocking BGP (11:43)
- TTL BGP Packet Expires (4:22)
- Mis-Configured Peer Groups (6:20)
Troubleshooting - BGP Route Exchange
- BGP Routes - Missing Mask (8:51)
- Next-Hop not Reachable (10:29)
- BGP Split-Horizon Rule (4:09)
- Route-Filtering Issue (13:21)
- Better Source Routing (5:12)
SDWAN Introduction
- Why SD-WAN make sense today
- SD-WAN basic functionality
- SD-WAN vendor space
- SD-WAN Solution Components
- SD-WAN Solution Overview
- SD-WAN Components
SD-WAN Architecture
- Traditional WAN – Challenges
- SD-WAN Overview and definitions
- SD-WAN Benefits
- SD-WAN Key Concepts
- Cisco SD-WAN Architecture and Components
- Orchestration plane (vBond, NAT)
- Management plane (vManage)
- Control plane (vSmart, OMP, OMP-GR)
- Data plane (vEdge)
- TLOC
- IPsec
- Route (OMP route, TLOC route, Service Route)
- BFD
- WAN Edge platform types, capabilities (vEdges, cEdges)
SD-WAN Controller Deployment
- Controller cloud deployment
- Controller on-Prem Deployment
- Hosting platform (KVM/Hypervisor)
- Installing controllers
- Scalability and redundancy
- Configure and verify certificates and whitelisting
- Troubleshoot control-plane connectivity between controllers
- Router Deployment
Describe WAN Edge deployment
- On-boarding
- Orchestration with zero-touch provisioning/plug-and-play
- Single/multi data center/regional hub deployments
- Configure and verify SD-WAN data plane
- TLOC understanding
- Underlay-overlay connectivity
- Configure and verify OMP
- Configure and verify TLOCs
- Configure and verify CLI and vManage feature configuration templates
- VRRP
- OSPF
- BGP
Cloud onRamp
- SaaS
- Iaas
- Colocation services
Policy Framework
- Policy Configuration overview
- Policy distribution
- Policy attachment points
- Configure and verify control policies
- Configure and verify data policies
- Configure and verify end-to-end segmentation
- VPN segmentation
- Configure and verify SD-WAN application-aware routing
- Configure and verify direct Internet access
Security and Quality of Service
- Configure and verify service insertion
- Describe application-aware firewall
Application QoE
- Understanding about NBAR
- Configure and verify QoS treatment on WAN edge routers
- Scheduling
- Queuing
- Shaping
- Policing
Management and Operations
- Describe monitoring and reporting from vManage
- Configure and verify monitoring and reporting
- Describe REST API monitoring
- Describe software upgrade from vManage
Cisco SD-Access Overview
- Exploring Cisco SD-Access
- Describing the Cisco SD-Access Architecture
- Exploring Cisco DNA Center
- Configuring Underlay Automation
Cisco SD-Access Implementation
- ISE Integration in DNA Center
- Policy Provisioning Basics
- Navigating and Managing the Policy Application Workflows
Cisco SD-Access Border Operations
- Cisco SD-Access Deployment Models
- Connecting the Fabric to External Domains
Wireless Integration Orchestration
- Integrating Wireless with the Cisco SD-Access Solution
- Workflow of Cisco SD-Access Wireless
- Cisco SD-Access Wireless Network Design
- Cisco SD-Access Wireless Basic Operation
Cisco SD-Access Assurance and Migration
- Cisco Network Data Platform
- Cisco SD-Access Migration Strategies
Lab outline
- Validating DNA Center and Underlay Connectivity
- Configuring the Identity Services Engine
- Enabling Dynamic Authentication
- Configuring DNA Center Design
- Creating SD-Access Policy
- Provisioning SD-Access Overlay
- Configuring SD-Access Wireless Integration