Online Courses

CCIE ENTPERISE INFRASTRUCTURE

Duration – 6 Months

Price – 90,000 INR ( 1200 USD )

DEMO VIDEO (YouTube links)

Training Program Includes

Contact us to reserve your slot for Online Trainings

For more Details Mail us on info@noasolutions.com

Faster communication – WhatsApp – +91 7036826345

Course Content

CCNP CCIE ENTEPRISE – Core Technology + Lab Preparation
Instructor - Sikandar Shaik CCIEx3

  • Core Technology Training – 10 Days
  • Lab exam preparation – 4 Days  
  • Duration – 8 – 10 hrs/day ( Theory /Labs )

Training / Support till you pass CCIE LAB / or 6 months after Training
Training Program Includes • 
===============================
1.         Live Training by Sikandar Shaik CCIEx3
2.         Pre-recorded Videos – for future reference.
3.         Detailed lab Workbooks (slides/Labs)
4.         Virtual Lab setup for LAB PRACTICE
============================================

COURSE CONTENT
CCNP Certifications - Overview

  • About Cisco
  • Cisco Certification Updates
  • Cisco Re-Certification
  • CCNP Certifications
  • CCIE Certifications
  • Cisco Certification Migration Options
  • Required Exams for CCNP

ENCOR 350-401 Course Content

  • CCNP ENCOR-350-401
  • CCNP ENCOR-Contents

CCNP Labs- Setup - GNS3

  • Cisco Lab Options
  • About GNS3
  • Installing GNS3 on Windows
  • GNS3 - Adding IOS Images
  • Default Topology- IOS Routers -Initial Configurations
  • IOS Default Topology
  • Connecting GNS3 Topology to Host Computer
  • GNS3- VMWARE Integration
  • GNS3 - IOSv L2-L3 Configuration Steps
  • GNS3 - ASAv Setup
  • GNS3- IOU- L2-L3 Configuration Steps

Basic Switching

  • Local Area Network
  • Ethernet
  • SOHO LANs
  • Enterprise LAN
  • Transmission Media - UTP cables
  • Fiber Cables - Wireless
  • Basic LAN Setup
  • Address Resolution Protocol - ARP

Virtual LAN (VLAN)

  • What is Broadcast Domain
  • What is VLAN
  • VLAN Types
  • VLAN Ranges
  • Creating VLANs
  • VLANs- Assigning Ports
  • VLAN-Design
  • Voice VLAN
  • 009 Management VLAN

Trunking VLANs

  • VLANs- Multiple Switches
  • Trunk Links
  • Access- Trunk Links
  • 802.3 Ethernet Frame Format
  • Frame tagging - on Trunk Links
  • Trunking Protocols - ISL-DOT1Q
  • Trunk Link - Configuration

Inter-VLAN Routing

  • Forward Packets between VLANs
  • VLAN Routing - Methods
  • VLAN Routing- Physical Gateways
  • VLAN Routing -Physical Gateway - Configuration
  • VLAN Routing Physical Gateway- Limitations
  • VLAN Routing - Sub interfaces
  • VLAN Routing - Sub interfaces - Configuration - PART 1
  • VLAN Routing- Sub interfaces -PART 2
  • VLAN Routing Sub Interfaces - Advantages - Disadvantages
  • VLAN Routing – SVI – L3 Switch
  • SVI- Configurations
  • SVI - Multiple Switches
  • L3 Routed Ports

VLAN Trunking Protocol - VTP

  • What is VTP
  • VTP Modes
  • VTP-configuration

Spanning Tree Protocol (STP)

  • Bridging loops with Redundant links
  • Bridging Loops - STP
  • How STP Works
  • Selecting Root Bridge
  • Root Bridge - Verification
  • Root Port Selection- PART 1
  • Root Port Selection- PART 2
  • STP till now - Review
  • Selecting Designated Ports

STP Terminology

  • Root Port -VS- Designated Ports
  • STP – Hello BPDUs
  • STP Convergence
  • STP Timers
  • STP Interfaces States

STP Tuning

  • Hierarchical Campus model
  • Selecting Root Bridge -STP
  • Tuning STP Cost-Priority - Timers
  • EtherChannel - Port Channel
  • 704 Spanning Tree Port Fast
  • Rapid Spanning Tree Protocol - RSTP
  • STP Convergence

 Rapid STP /Multiple STP  – RSTP & MSTP

  • RSTP Port Roles
  • RSTP BPDU
  • Per VLAN STP (PVST) - Multiple STP (MSTP)
  • Per VLAN STP - PVST
  • MSTP Lab Verification
  • Tuning MSTP Port Priority - Cost

Switch Port Analyzer - SPAN-RSPAN_ERSPAN

  • SPAN - Switch Port Analyzer
  • SPAN - Configuration Example
  • Remote Switch Port Analyzer - RSPAN
  • RSPAN - Example
  • Encapsulated Remote SPAN - ERSPAN
  • SPAN Conditions and Restrictions

Static -Default Routing

  • Routing- Introduction
  • Static Routing
  • Static Routing Lab
  • Static Routing- 3 Routers
  • Default Routing
  • Verify Default Routing
  • Routing Table Lookup
  • Building Routing table
  • Floating Static-Default Routing - PART 1
  • Floating Static-Default Routing - PART 2

Open Shortest Path First - OSPF

  • Knowledge - Prerequisite (2:01)
  • OSPF - Overview (6:12)
  • OSPF - How it Works (3:28)
  • OSPF – Becoming Neighbors (11:04)
  • OSPF - LSDB- Database (5:18)
  • Exchanging the LSDB (6:26)
  • Router-ID (12:40)
  • Maintaining Neighbors - LSDB (7:35)
  • Synchornize LSDB- Best Route (4:57)
  • OSPF -Tables (2:31)

OSPF Configuration - Single Area

  • OSPF Configuration Syntax (8:15)
  • OSPF - Wild Card Mask (9:14)
  • OSPF Single Area - Pre-Requisite (2:30)
  • OSPF Single Area-Configuration (6:59)
  • OSPF - Single Area- Verification (8:52)
  • OSPF - Advertisement Example (4:07)

OSPF Metric - COST

  • Calculate Best Routes - OSPF (5:48)
  • OSPF Metric - COst (5:59)
  • Changing Interface Bandwidth (5:49)
  • Default Reference BW- Limitations (1:25)
  • Manual Cost (3:49)
  • Auto-Cost Reference BW (6:04)

OSPF Multiple Areas

  • OSPF Single Area - Limitations (7:13)
  • MUltiple Areas (7:05)
  • MUlti-Ares -Design Rules (14:31)
  • Multi-Area - Configurations (5:05)
  • LAB - Mutl-Area- Configuration (11:51)
  • OSPFv2 Interface SubCommands (9:33)

OSPF Network Types

  • OSPF Network Types (7:29)
  • OSPF Broadcast Networks- DR-BDR (9:40)
  • DR-BDR - Elections (9:12)
  • OSPF DR-BDR - Lab (12:48)
  • OSPF Point to Point LInks (8:52)

Default Route Advertisements - OSPF

  • OSPF Default Routes Advertisements (3:32)
  • Advertising Default Routes -IGP (8:45)
  • OSPF Default Route- LAB (12:54)
  • OSPF Default Routes - Options (9:52)

OSPF Advance

  • OSPF virtual links (9:40)
  • LAB OSPF virtual links (17:10)
  • OSPF LSA Types (16:31)

OSPF STUBS

  • OSPF Stubs-Introduction (10:56)
  • LAB-OSPF Stubs (19:18)
  • OSPF Totally STUB (5:45)
  • LAB-OSPF Totally STUB (7:53)
  • Not-so-stubby Area - NSSA (7:38)
  • LAB-Not-so-stubby Area - NSSA (16:07)
  • Totally Not-so-Stubby Area - Totally NSSA (9:39)
  • 1408 Quick Review (4:35)

OSPF Enhancements

  • OSPF Graceful Shutdown (7:04)
  • OSPFv3 Address-family support (16:26)
  • OSPF TTL security (8:45)
  • OSPFv2 Authentication Enhancements (7:54)

EIGRP Routing Protocol

  • EIGRP (5:14)
  • EIGRP - How it works (5:39)
  • Verify EIGRP Process (5:17)
  • EIGRP Tables (5:42)
  • EIGRP Convergence (3:45)
  • Metric Path Calculation - 1 (13:41)
  • Metric Path Calculation - 2 (9:41)
  • EIGRP Configuration (14:00)
  • Successor- Feasible Successor (5:31)
  • Feasible - Reporting Distance (11:38)
  • Feasibility Condition (8:55)

EIGRP Optimization

  • EIGRP Load Balancing-Equal cost (10:07)
  • EIGRP Load Balancing-Unequal cost (15:54)
  • EIGRP Stuck-in-Active (4:31)
  • EIGRP Stub (5:45)
  • EIGRP Summarization-Leak map (13:15)

EIGRP Name Mode

  • EIGRP Name Mode (6:07)
  • EIGRP Name Mode- Routing-IPv4-v6 (19:44)
  • EIGRP Name Mode-Authentication (12:55)
  • EIGRP Wide Metric (8:14)

IPv6

  • IPV6- Introduction (8:46)
  • IPv6 Addressing (6:35)
  • IPV6 Address types (17:09)
  • IPV6 Static Addressing (10:43)
  • IPv6 Static-Default Routing (13:21)
  • OSPFv3 (13:43)
  • EIGRP-IPv6 (14:57)

Redistribution IPv4 - IPv6

  • Redistribution-Introduction (9:24)
  • EIGRP- RIP-Redistribution (13:16)
  • OSPF RIP Redistribution (15:39)
  • OSPF EIGRP Redistribution (5:15)
  • Redistribution -Mock lab (19:25)
  • EIGRP6- OSPFv3 Redistribution (7:42)

Summarization IPv4 - IPv6

  • Summarization (9:44)
  • Summarization - Advantages (3:32)
  • Auto-Summary (8:24)
  • AutoSummary-Verification (6:00)
  • Manual Summary (3:20)
  • Calculate Summary Address- EX-1 (9:02)
  • Calculate Summary Address- EX-2 (2:32)
  • Calculate Summary Address- EX-3 (2:19)
  • Summarization Conditions (10:13)

Summarization (11:24)

  • Summarization - NULL 0 (15:34)
  • OSPF Summarization LAB (15:12)
  • EIGRP6 Summarization (8:22)
  • OSFv3 Summarization (11:12)

Routing Protocol Authentication

  • Routing Protocol Authentication (7:12)
  • EIGRP-Authentication (9:24)
  • OSPF-Authentication (4:38)
  • LAB-OSPF-Inteface-based-Authentication (13:35)
  • OSPF Area-based-Authentication (6:46)
  • OSPF Virtual link-Authentication (15:27)
  • OSPFv3 Authentication (8:11)

Route Filtering

  • Route Filtering - Introduction (10:11)
  • Passive Interface (12:42)
  • LAB-Verify Passive interface (14:40)
  • Distribution-Lists (8:36)
  • LAB-Distribution List (13:28)
  • IP Prefix-Lists (9:48)
  • LAB-Verify Prefix-list- PART 1 (15:45)
  • LAB-Verify Prefix-list- PART 2 (14:54)

Route-MAPS

  • Route-Maps-Introduction (8:24)
  • LAB-Route-MAPS - PART 1 (9:04)
  • LAB-Route-MAPS - PART 2 (13:37)
  • Route-filtering using Route-MAPS (11:05)

Policy Based Routing- PBR

  • Policy Based Routing (10:51)
  • PBR based on Source (17:07)
  • PBR based on destination (12:35)
  • PBR based on Services (9:11)
  • PBR based on Packet size (7:37)

Border Gateway Protocol - BGP

  • Border Gateway Protocol - Introduction (14:22)
  • BGP options connecting to Internet (17:32)
  • When BGP is more Appropriate (10:23)

BGP Neighbors - IBGP

  • Understanding BGP neighbors - IBGP- EBGP (10:50)
  • IBGP neighbors -LAB (16:46)
  • BGP Split Horizon Rule (10:35)
  • IBGP Neighbors using Loopback-LAB - PART 1 (18:05)
  • IBGP Neighbors using Loopback-LAB - PART 2 (17:12)

BGP Neighbors - IBGP - Advance

  • BGP Neighbors - Authentication (7:31)
  • BGP Neigbors - using PeeGroups (11:42)
  • IBGP neighbors - with Route Reflectors (19:26)

External BGP - IBGP

  • Basic EBGP configuration (7:55)
  • BGP Next-hop-Self (17:48)
  • EBGP using loop-back -EBGP Multi-Hop (16:41)
  • BGP synchronization Rule (11:34)

BGP Attributes

  • Understanding BGP Attributes (9:56)
  • ASPATH -ORIGIN- NEXTHOP Attributes (17:47)
  • WEIGHT & LOCAL PREFERENCE Attributes (12:35)

BGP Weight and Local Preference Attributes

  • Path Manipulation using WEIGHT Attribute - PART 1 (14:10)
  • Path Manipulation using WEIGHT Attribute - PART 2 (6:48)
  • WEIGHT using ROUTE_MAPS-LAB (17:00)
  • Understanding IN OUT (7:09)
  • BGP Attribute - Local preference (18:29)
  • Local Preference with Route-maps (14:38)
  • BGP path selection Process (16:09)
  • Clear ip bgp sessions (17:07)

IPv6-BGP

  • IPv6 BGP Introduction (5:38)
  • IPV6 IBGP- EBGP Configuration (14:30)
  • IPV6 PeerGroups and Route Reflectors (13:38)
  • IPV6 EBGP Multi-hop (16:48)
  • IPV6 IPV6 BGP path Manipulation (9:51)

Virtual Private Networks - VPN

  • VPN-Introduction (5:09)
  • VPN Types (3:49)
  • VPN Logical Topologies (1:25)
  • VPN Default Lab Setup- Routers (5:22)

GRE - Generic Routing Encapsulation

  • VPN over Internet (4:37)
  • Generic Routing encapsulation (7:33)
  • LAB- GRE point to point Configuration (7:11)
  • LAB- GRE point to point Configuration Advance (7:41)
  • Drawbacks of GRE (4:38)

Dynamic Multipoint VPN - DMVPN

  • DMVPN - Introduction (7:15)
  • DMVPN-Protocols (4:07)
  • DMVPN - mGre Tunnels (3:27)
  • DMVPN-NHRP Protocol - Messages (11:00)
  • VPN Default Lab Setup- Routers (5:22)
  • DMVPN-Basic Tunnel Configuration Example (15:27)
  • EIGRP Routing over DMVPN (9:37)

DMVPN Phase 1

  • DMVPN- Phases 1-2-3 (10:06)
  • DMVPN Phase 1 - Tunnel Configuration (8:35)
  • DMVPN-Phase1 -EIGRP Routing (9:17)
  • DMVPN-Phase1 -OSPF Routing (7:57)

DMVPN Phase 2

  • DMVPN Phase 2-Tunnel Configuration (5:13)
  • DMVPN Phase 2-OSPF Routing (11:04)
  • DMVPN Phase 2-EIGRP Routing (15:40)

DMVPN Phase 3

  • DMVPN Phase 3 -Overview (5:52)
  • DMVPN Phase 3- Tunnel Configuration (1:47)
  • DMVPN Phase 3- EIGRP Routing (7:48)
  • DMVPN Phase 3- OSPF Routing (4:52)

IPSEC - Introduction

  • what is IPSEC ? (2:48)
  • IPsec Security Services (6:53)
  • IPsec Modes - Tunnel vs Transport (5:29)

IPSEC Site to Site VPN

  • How IPsec VPN works (5:19)
  • Step-1 Interesting Traffic Configuration (3:02)
  • Step-2 IKE Phase-1 (7:36)
  • Step-3- IKE - Phase 2 (8:30)
  • IKE Phase -2 Configuration- Verification (6:56)

IPSEC over DMVPN

  • IPSEC VPN - Limitations (4:59)
  • IPSec over DMVPN (3:19)
  • LAB - IPSec Over DMVPN (11:17)

MPLS VPN - Introduction

  • VPN models overview (13:45)
  • VPN models -Advantages and Disadvantages (6:51)
  • Cisco express forwarding (10:51)
  • MPLS VPN overview (7:54)

MPLS VPN - Cisco Express Forwarding

  • MPLS VPN - Introduction (17:47)
  • Layer 3 Process switching - CEF (5:52)
  • Identify Network Device Planes (2:44)
  • Data Plane (6:09)
  • Control Plane (3:27)
  • Management Plane (2:31)
  • Cisco Express Forwarding - CEF (6:44)
  • CEF in MPLS Networks (3:57)

MPLS - Label Distribution Protocol

  • MPLS – Label Distribution Protocol (2:08)
  • Configuring LDP – MPLS Core (18:54)
  • How LDP Label forwarding Works (4:21)
  • MPLS LDP - Verification (10:48)
  • MPLS LDP Troubleshooting (19:50)
  • Penultimate hop popping – PHP (8:54)

MPLS - VRF - RD - RT

  • VRF -Virtual Routing and Forwarding (7:56)
  • RD - Route-Distinguisher (8:00)
  • RT - Route Target (9:03)
  • RD vs RT values (7:21)
  • VRF, RD, RT – Configuration (11:48)

MPLS L3 VPN - 6 Steps

  • MPLS L3 VPN -Configuration Steps (11:58)
  • Routing PE- CE – RIPv2 (10:35)
  • Multi-Protocol -BGP (8:48)
  • VPNv4 -Peering PE-PE (21:40)
  • Redistribution on PE Routers (13:04)
  • MPLS L3 VPN - LSP Verification (5:55)

MPLS L3 VPN - Routing Options

  • MPLS L3 VPN - Configuration Steps - Review (6:14)
  • MPLS L3 VPN - EIGRP PE-CE Routing (16:28)
  • MPLS L3 VPN - Static-Default -PE-CE (11:04)
  • MPLS L3 VPN - BGP Routing -PE-CE (17:12)
  • MPLS L3 VPN - OSPF Routing -PE-CE (12:45)

MPLS L3 VPN Advance Options

  • Overlapping VPNs (9:08)
  • Overlapping VPNs- Continued (11:37)
  • Overlapping VPN- Advance (17:50)
  • Layer 2 MPLS VPN- Overview (11:37)
  • -IPV6 support - MPLS (4:40)
  • -MPLS Traffic Engineering- overview (8:34)
  • Inter AS VPN overview (3:22)

MPLS L3 VPN Troubleshooting

  • MPLS L3 VPN- Troubleshooting (11:38)
  • MPLS L3 VPN- Troubleshooting-Continued (17:05)

Threat Defense Technologies

  • What is Firewall
  • Next Generation Firewalls
  • AAA- Network Security
  • Cisco Traffic Telemetry methods
  • Virtual Private Networks
  • Web Access-Possible Threats
  • Web Traffic-Security
  • Cisco Web Security - WSA - CWS
  • Email Based Threats
  • Cisco Email Security - ESA - CES
  • Intrusion Prevention System - IPS

Network Infrastructure Protection

  • Network Infrastructure Protection
  • Identify Network Planes
  • Data Plane
  • Control Plane
  • Management Plane

Remote Management - TELNET -SSH

  • Inband vs OutBand
  • Remote Access - Telnet
  • Remote Access - SSH

AAA - Authentication-Authorization-Accounting

  • AAA- Network Security (10:37)
  • AAA - Components (3:50)
  • AAA - Protocols -TACACS- RADIUS (7:35)
  • AAA - Cisco Authentication Servers (3:51)

AAA - Authentication

  • AAA Authentication - Device Access (2:54)
  • Authentication - Local Database (9:54)
  • AAA - External Servers (3:19)
  • LAB- Authentication - TACACS (11:34)

AAA Authorization

  • Authorization - Device Access (3:27)
  • IOS Privilege Levels (8:48)
  • LAB -Local Authorization- Privilege Levels (14:23)
  • IOS Privilege Levels - Limitations (4:57)
  • Role based CLI Access - RBAC (5:33)
  • RBAC - Views Types (4:22)
  • LAB1- RBAC Views (9:44)
  • LAB2 - Modify RBAC Views (3:39)
  • LAB3 - RBAC Views (5:42)
  • LAB4 - RBAC Super Views (5:13)

DHCP -Dynamic Host Configuration Protocol - IPv4 - IPv6

  • DHCP-Overview (7:25)
  • Router as DHCP server (11:19)
  • DHCP Relay Agent (13:34)
  • DHCPv6 Configuration (9:59)
  • DHCPv6 Relay Agent (10:07)

Cisco Telemetry Services

  • Cisco Traffic Telemetry methods
  • Device-Network Events Logging
  • Syslog - Terminal Logging
  • Network Time Protocol
  • NTP -Stratum Value
  • LAB - NTP - Configuration

Cisco Telemetry Services

  • Cisco Traffic Telemetry methods (3:38)
  • Device-Network Events Logging (9:39)
  • Syslog - Terminal Logging (6:48)
  • Network Time Protocol (7:01)
  • NTP -Stratum Value (3:40)
  • LAB - NTP - Configuration (8:45)
  • SNMP - Simple Network Management Protocol (18:05)
  •  IP Service Level Agreement (9:50)
  •  IP SLA Configuration example (11:51)

Access Control Lists- ACL

  • Access Control Lists (12:02)
  • ACL Types (2:38)
  • Standard - Extended ACL (9:34)
  • ACL Logic- How Match Rules (8:38)

Standard ACL

  • Standard ACL lab - Prerequisite (6:03)
  • Standard ACL Lab (4:42)
  • ACL - Wild Card Mask (11:21)
  • ACL Statements- Things to Know (8:45)
  • Standard ACL - Configuration (10:54)
  • Apply ACL - Select Right Interface (10:17)
  • Standard ACL- IN- OUT (10:45)
  • Standard ACL - Verification (6:22)
  • Standard ACL- Wrong Direction (5:32)
  • Standard ACL - Practice Examples (8:03)
  • Standard ACL- Find IP-Ranges (10:32)

Extended ACL

  • Extended ACL (3:59)
  • Extended ACL- Lab Pre-Requisite (8:23)
  • Extended ACL - Config Example (1:49)
  • Similarities- Extended - Standard ACL (3:27)
  • Extended ACL- Things to Know (8:31)
  • Extended ACL- Syntax (11:00)
  • Extended ACL- Configuration (10:30)
  • Extended ACL-Apply - Verify (13:13)
  • Extended ACL - Examples (13:23)

Named ACL

  • Named ACLs (10:42)
  • Named ACL- Syntax (5:35)
  • Named Standard ACL - Configuration (2:04)
  • Named Extended ACL - Configuration (1:24)
  • Editing Named ACLs (8:55)
  • Time based ACL (13:27)
  •  IPv6 ACL (19:42)

Control Plane Security

  • Control Plane - Possible Threats (8:32)
  • Routing Protocol Authentication (11:50)
  • Control Plane Policing -CoPP (7:11)
  • Class map -Policy map -Hierarchy (5:23)
  • CoPP_ Configuration Example (12:14)

IPv6 First Hop Security

  • IPV6 Layer 2 Options (11:07)
  • IPv6 First hop security-Introduction (4:49)
  • IPv6 RA Guard (7:39)
  • DHCPv6 Guard (5:16)

Zone Based Firewall - ZBF

  • IOS - Zone based Firewall
  • ZBF- Configuration overview
  • ZBF- Security Zones
  • ZBF - Default Traffic flow
  • Class Map -Policy Map -Hierarchy
  • ZBF - Classify Traffic using Class-maps
  • ZBF- Class-map Configuration
  • ZBF- Policy map- Zone Pairs

Virtual Private Networks - VPN

  • VPN-Introduction
  • VPN Types
  • VPN Logical Typologies
  • VPN Default Lab Setup- Routers

GRE - Generic Routing Encapsulation

  • VPN over Internet
  • Generic Routing encapsulation
  • Default Lab setup
  • LAB- GRE point to point Configuration
  • LAB- GRE point to point Configuration Advance
  • Drawbacks of GRE

Dynamic Multipoint VPN - DMVPN

  • DMVPN - Introduction
  • DMVPN-Protocols
  • DMVPN - mGre Tunnels
  • DMVPN-NHRP Protocol - Messages
  • VPN Default Lab Setup- Routers
  • DMVPN-Basic Tunnel Configuration Example
  • EIGRP Routing over DMVPN

What is IPSEC ?

  • What is IPSEC
  • IPsec Security Services
  • IPsec Modes - Tunnel vs Transport

IPSEC Site to Site VPN

  • How IPsec VPN works
  • Step-1 Interesting Traffic Configuration
  • Step-2 IKE Phase-1
  • Step-3- IKE - Phase 2
  • IKE Phase -2 Configuration- Verification

Network Address Translation -NAT

  • NAT- What we Cover
  • Why do we need NAT
  • What is NAT
  • NAT Types
  • NAT - Lab Setup
  • Static NAT - LAB
  • Dynamic NAT- LAB
  • PAT- LAB
  • PAT with Exit Interface

First Hop Redundancy Protocols (FHRP)

  • First Hop Redundancy Protocols - Overview
  • FHRP Protocols - HSRP - VRRP - GLBP
  • HSRP lab - Basic Configuration
  • HSRP lab - Advance Configuration
  • HSRP Load sharing using Multiple Groups
  • VRRP Configuration LAB
  • GLBP Configuration LAB
  • GLBP - Tracking and Load Balancing

IP Service Level Agreement - IP SLA

  • IP SLA Configuration Example
  • IP Service Level Agreement

IP Multicasting

  • Multicasting - Overview
  • Multicast-Benefits
  • How Multicast works
  • Multicast IP Ranges

IGMP - PIM Protocols

  • IGMP Protocol and Versions
  • Protocol independent Multicast
  • PIM Modes -Trees
  • Dense mode - Configuration
  • RPF check _ loop prevention

PIM Sparse Mode - Rendezvous Point

  • PIM sparse-mode Operation
  • Sparse-Mode Configuration
  • Static RP
  • Auto-RP
  • Auto-RP Configuration
  • Auto-RP Redundancy
  • Auto-RP Load Sharing
  • PIM-Bootstrap Router

Quality of Service (QoS)

  • Quality of Service (QoS) - Overview
  • QoS - MQC configuration
  • Quality of Service (QoS) Mechanisms
  • QoS Models

Classification & Marking

  • Classification and Marking
  • Layer 2 & Layer 3 Marking
  • Classification & Marking - Configuration Example

Congestion Management - Queueing

  • Queuing - Overview
  • Legacy Queuing Mechanisms
  • 603 Weighted fair Queuing
  • Class Based Weighted Fair Queuing
  • Low Latency Queuing

QoS - Congestion Avoidance

  • Congestion Avoidance- Introduction
  • WRED-CBWRED
  • CBWRED-configuration
  • Traffic Policing - Shaping
  • Traffic Policing and Shaping

What is Network Mangement ?

  • What is Network Management
  • Past-Present Methods of Network Management - PART 1
  • Past-Present Methods of Network Management - PART 2
  • SNMP - Simple Network Management Protocol

What is Network Automation ?

  • Challenges - Traditional Management
  • Network Automation- Goals
  • Types of Network Automation
  • What can be Automated- PART 1
  • What can be Automated - PART 2
  • Impact of Network Automation

Software Defined Networking - SDN & SDN Controllers

  • Automation Origination Points
  • SDN- Software Defined Networking
  • SDN Controllers
  • Networks Managed by SDN Controllers

SDN-Control - Management - Data Planes

  • Identify Network Device Planes
  • Identify Network Device Planes
  • Data Plane
  • Control Plane
  • Management Plane
  • Control Plane- Data Plane
  • SDN- management Plane

SDN Models - Architecture

  • SDN - Imperative Model
  • SDN - Declarative Model
  • SDN-Network Design Requirements
  • Underlay Networks
  • Overlay Networks
  • SDN Fabric

Application Programming Interface - API

  • API - Application Programming Interface
  • API - Types
  • API - with SDN Networks
  • NorthBound API
  • SounthBOund API

Cisco DEVNET- SANDBOX

  • Cisco DEVNET
  • DevNET Certifications
  • DevNET SandBox
  • Sandbox LABS
  • Sandbox Lab Access-Reservations

Cisco DNA Center

  • Cisco DNA Center
  • DNA Center Appliance
  • DNA Center- What can do - PART 1
  • DNA Center- What can do - PART 2

Application Programming Interface - API

  • Web Service API
  • Web Service API - Commonly Used
  • REST API

Network Automation Tools

  • Config MGMT Tools
  • Config MGMT Tools - Capabilities
  • Config-MGMT tools - Similarities
  • Master - Agent
  • Agent based- Agentless
  • Push-Pull Model
  • Configuration Files

PUPPET Config Management Tool

  • PUPPET-Tool
  • Puppet Master-Agent-Database
  • Puppet-Manifest
  • Puppet-Module-Forge
  • Puppet Agent-Agentless
  • Puppet- PULL Model Steps

CHEF Config Management Tool

  • CHEF-Terminology
  • CHEF- Config MGMT Tool

ANSIBLE Config MGMT Tool

  • ANSIBLE-Tool
  • ANSIBLE-Control Station
  • ANSIBLE -PLayBook-Inventory
  • ANISBLE - Templates-Variables

JSON DATA Encoding

  • API Data Formats
  • JSON Overview
  • JSON Data Types
  • JSON Syntax Rules
  • JSON Data Interpretation

Wireless LAN Foundations -WLAN

  • Wired vs Wireless Networks
  • Types of Wireless Networks
  • WLAN Devices - AP-WLC
  • Ad-HOC vs Infrastructure Mode

Service Sets - SSID-BSS-ESS

  • SSID-Service Set Identifier
  • Service Sets - Types
  • Independent Basic Service Set - IBSS
  • Basic Service Set -BSS
  • Extended Service Set- ESS
  • Distribution System

RF - WLAN Standards

  • Wireless Signal Basics
  • Frequency - Ranges
  • IEEE- 802 Standards
  • 802.11 - Wireless LAN Standards
  • 802.11 - a - b - g
  • 802.11 n
  • 802.11 ac
  • 802.11 ax

Wireless Architecture - WLC Deployments

  • Wireless Architectures
  • Autonomous AP - Architecture
  • Autonomous AP - Challenges
  • Split-MAC Architecture- Lightweight AP
  • LAP-WLC Binding
  • CAPWAP Tunnels
  • CAPWAP Messages
  • WLC Deployments Methods

Trouble Shooting - Routing Pre-requisite

  • Troubleshooting - Routing- Pre-requisite (16:40)
  • Troubleshoot - WAN Connectivity - PART 1 (11:50)
  • Troubleshoot - WAN Connectivity - PART 2 (10:58)

Troubleshooting - Static Routing

  • Troubleshoot - IPv4 Static Routing (17:01)
  • Trouble Ticket - IPv4 Static Routing (18:01)
  • Troubleshoot - IPv6 Static Routing (9:56)
  • IPv6 Static Routing - Trouble Ticket (8:35)

Troubleshoot - EIGRP Neighbors

  • EIGRP interface Down (7:12)
  • EIGRP AS-Number Mismatch (3:59)
  • Incorrect Network Statements (6:38)
  • Neighbors on Different Subnets (6:31)
  • Authentication Mismatch (9:22)
  • K-Values Mismatch (5:10)
  • Passive-Interface issue (4:33)
  • ACL Dropping EIGRP (8:00)
  • Timers Mismatch (3:14)

Troubleshoot - EIGRP Route Exchange

  • Troubleshoot EIGRP Routes - Interface down (6:00)
  • Missing Network Statements (4:38)
  • Better Source Routing update (8:15)
  • Route Filtering Issues (8:18)
  • Stub Configuration Problem (5:03)
  • Split Horizon Issues (3:59)

EIGRP Trouble Tickets

  • EIGRP Trouble Ticket 2 (10:33)
  • EIGRP Trouble Ticket 1 (11:01)
  • EIGRP Trouble Ticket 3 (7:58)
  • EIGRP Trouble Ticket 4 (6:39)
  • EIGRP Trouble Ticket 5 (12:10)

Troubleshoot - OSPF Neighbors

  • Troubleshoot OSPF - Subnets - Interface status (8:50)
  • Advertisements - Area Mismatch (6:07)
  • Timers Mis-Match (3:38)
  • Authentication Mismatch (5:40)
  • OSPF Passive Interface (4:43)
  • ACL Dropping OSPF Packets (6:45)
  • MTU Mismatch (3:41)
  • Duplicate Router -ID (3:20)
  • Network Types - Mismatch (5:40)
  • Stub Flag Mismatch (6:00)

Troubleshoot - OSPF Route Exchange

  • Troubleshoot OSPF Routes - Interface down -Not Advertised (11:56)
  • Duplicate Router-ID (7:24)
  • Better Source Routing information (4:51)
  • Route Filtering issue (7:20)
  • Stub Configuration Issue (3:01)
  • Wrong DR Elections (5:07)

OSPF Trouble Tickets

  • OSPF Trouble Tickets 1 (11:10)
  • OSPF Trouble Tickets 2 (9:29)
  • OSPF Trouble Tickets 3 (10:51)
  • OSPF Trouble Tickets 4 (7:53)
  • OSPF Trouble Tickets 5 (9:14)
  • OSPF Trouble Tickets 6 (10:08)
  • OSPF Trouble Tickets 7 (9:56)

Troubleshooting - BGP Neighbors

  • BGP Troubleshooting - Neighbors (11:09)
  • Incorrect Neighbor Statement (9:23)
  • L3 Connectivity Issues (11:11)
  • L3 Reachability - Via Default Route (2:40)
  • BGP Source Address issue (2:19)
  • Mismatch Authentication (4:37)
  • ACL-Firewall Blocking BGP (11:43)
  • TTL BGP Packet Expires (4:22)
  • Mis-Configured Peer Groups (6:20)

Troubleshooting - BGP Route Exchange

  • BGP Routes - Missing Mask (8:51)
  • Next-Hop not Reachable (10:29)
  • BGP Split-Horizon Rule (4:09)
  • Route-Filtering Issue (13:21)
  • Better Source Routing (5:12)

SDWAN Introduction

  • Why SD-WAN make sense today
  • SD-WAN basic functionality
  • SD-WAN vendor space
  • SD-WAN Solution Components
  • SD-WAN Solution Overview
  • SD-WAN Components

SD-WAN Architecture

  • Traditional WAN – Challenges
  • SD-WAN Overview and definitions
  • SD-WAN Benefits
  • SD-WAN Key Concepts
  • Cisco SD-WAN Architecture and Components
  • Orchestration plane (vBond, NAT)
  • Management plane (vManage)
  • Control plane (vSmart, OMP, OMP-GR)
  • Data plane (vEdge)
  • TLOC
  • IPsec
  • Route (OMP route, TLOC route, Service Route)
  • BFD
  • WAN Edge platform types, capabilities (vEdges, cEdges)

SD-WAN Controller Deployment

  • Controller cloud deployment
  • Controller on-Prem Deployment
  • Hosting platform (KVM/Hypervisor)
  • Installing controllers
  • Scalability and redundancy
  • Configure and verify certificates and whitelisting
  • Troubleshoot control-plane connectivity between controllers
  • Router Deployment

Describe WAN Edge deployment

  • On-boarding
  • Orchestration with zero-touch provisioning/plug-and-play
  • Single/multi data center/regional hub deployments
  • Configure and verify SD-WAN data plane
  • TLOC understanding
  • Underlay-overlay connectivity
  • Configure and verify OMP
  • Configure and verify TLOCs
  • Configure and verify CLI and vManage feature configuration templates
  • VRRP
  • OSPF
  • BGP

Cloud onRamp

  • SaaS
  • Iaas
  • Colocation services

Policy Framework

  • Policy Configuration overview
  • Policy distribution
  • Policy attachment points
  • Configure and verify control policies
  • Configure and verify data policies
  • Configure and verify end-to-end segmentation
  • VPN segmentation
  • Configure and verify SD-WAN application-aware routing
  • Configure and verify direct Internet access

Security and Quality of Service

  • Configure and verify service insertion
  • Describe application-aware firewall

Application QoE

  • Understanding about NBAR
  • Configure and verify QoS treatment on WAN edge routers
  • Scheduling
  • Queuing
  • Shaping
  • Policing

Management and Operations

  • Describe monitoring and reporting from vManage
  • Configure and verify monitoring and reporting
  • Describe REST API monitoring
  • Describe software upgrade from vManage

Cisco SD-Access Overview

  • Exploring Cisco SD-Access
  • Describing the Cisco SD-Access Architecture
  • Exploring Cisco DNA Center
  • Configuring Underlay Automation

Cisco SD-Access Implementation

  • ISE Integration in DNA Center
  • Policy Provisioning Basics
  • Navigating and Managing the Policy Application Workflows

Cisco SD-Access Border Operations

  • Cisco SD-Access Deployment Models
  • Connecting the Fabric to External Domains

Wireless Integration Orchestration

  • Integrating Wireless with the Cisco SD-Access Solution
  • Workflow of Cisco SD-Access Wireless
  • Cisco SD-Access Wireless Network Design
  • Cisco SD-Access Wireless Basic Operation

Cisco SD-Access Assurance and Migration

  • Cisco Network Data Platform
  • Cisco SD-Access Migration Strategies

Lab outline

  • Validating DNA Center and Underlay Connectivity
  • Configuring the Identity Services Engine
  • Enabling Dynamic Authentication
  • Configuring DNA Center Design
  • Creating SD-Access Policy
  • Provisioning SD-Access Overlay
  • Configuring SD-Access Wireless Integration
Configuring Wireless Hosts and Access Points
Scroll Up