CCNP: ENCOR - Implementing and Operating Cisco Enterprise Network Core Technologies (Exam 350-401) - ML

Duration
5 Days
Price
1.00 ج.م.‏
Course Type
No Location
This course teaches students about working with network core technologies. Topics covered include enterprise architecture, VLANS, EtherChannels, OSPF, Spanning-Tree Protocol, multicast protocols, Python, and more.

Course Outline

1 - Enterprise Architecture
  • Instructor Introduction
  • Cisco Enterprise Architecture Model
  • Campus LAN Design Fundamentals
  • Layers in the Hierarchial Model
  • Routed vs. Switched Campus Architecture
  • Traditional Multilayer Campus Layer Design
  • Access Layer
  • Distribution Layer
  • Core Layer
  • When the Core Layer is Needed
  • When the Core Layer is Needed (Cont.)
  • Campus Distribution Layer Design
  • Campus Distribution Layer Design (Cont.)
  • Campus Distribution Layer Design (Cont.)
  • Campus Distribution Layer Design (Cont.)
2 - VLANs and 802.1Q Trunking
  • Revisiting VLANs
  • Creating a VLAN
  • Assigning a Port to a VLAN
  • Creating a VLAN
  • Creating a VLAN (Cont.)
  • Creating a VLAN (Cont.)
  • Trunking with 802.1Q
  • Trunking with 802.1Q (Cont.)
  • VLAN Tagging
  • IEEE 802.1Q
  • Native VLAN
  • Configuring an 802.IQ Trunk
  • Configuring an 802.IQ Trunk (Cont.)
  • Configuring an 802.IQ Trunk (Cont.)
  • Inter-VLAN Routing
  • Option 1: Router with a Separate Interface in Each VLAN
  • Option 2: Layer 3 Switch
  • Demo
  • - Troubleshooting
3 - Switching
  • Layer 2 Switch Operation
  • Layer 2 Switch Operation (Cont.)
  • MAC
  • -Address Table and TCAM
  • Demo
  • - The CAM
  • Control and Data Plane
  • Cisco Switching Mechanisms
  • Cisco Switching Mechanisms (Cont.)
  • Cisco Switching Mechanisms (Cont.)
  • Process Switching and Fast Switching
  • Cisco Express Forwarding
  • Demo
  • - Cisco Express Forwarding
4 - EtherChannels
  • Need for EtherChannel
  • Need for EtherChannel (Cont.)
  • Need for EtherChannel (Cont.)
  • EtherChannel Mode Interactions
  • Layer 2 EtherChannel Configuration Guidelines
  • Layer 2 EtherChannel Configuration Guidelines (Cont.) EtherChannel Load-Balancing Options
  • EtherChannel Load
  • -Balancing Operation
  • Troubleshoot EtherChannel Issues
  • Troubleshoot EtherChannel Issues (Cont.)
  • Troubleshoot EtherChannel Issues (Cont.)
  • Demo
  • - Troubleshoot EtherChannel Issues
5 - EIGRP
  • EIGRP Feature
  • s
  • EIGRP Reliable Transport
  • EIGRP Operation Overview
  • EIGRP Packet Format
  • Establishing EIGRP Neighbor Adjacency
  • EIGRP Metrics
  • EIGRP Classic Metric Calculation
  • EIGRP
  • -Wide Metrics
  • EIGRP Path Selection
  • Loop Free Path Selection
  • EIGRP Load Balancing
  • Equal Cost Load Balancing
  • Unequal Cost Load Balancing
  • Traffic Sharing
  • Traffic Sharing (Cont.)
  • EIGRP for IPv6
  • EIGRP Components
  • Compare EIGRP and OSPF Routing Protocols
  • Demo- EIGRP Stub
  • Demo - EIGRP Load Balancing and Authentication
6 - BGP
  • Inter
  • -domain Routing with BGP
  • BGP Characteristics
  • Path Vector Functionality in BGP
  • BGP Routing Policies
  • BGP Operations
  • BGP Message Types
  • Types of BGP Neighbor Relationships
  • eBGP Neighbor Relationships
  • BGP Path Selection
  • BGP Best Path Selection Algorithm
  • BGP Path Attributes
  • BGP Path Attributes (Cont.)
  • Weight Attribute
  • Local Preference Attribute
  • AS -Path Attribute
  • MED Attribute
  • Demo- eBGP
7 - OSPF
  • Describe OSPF
  • Describe OSPF (Cont.)
  • The OSPF Process
  • The OSPF Process (Cont.)
  • The OSPF Process (Cont.)
  • The OSPF Process (Cont.)
  • The OSPF Process (Cont.)
  • OSPF Neighbor Adjacencies
  • OSPF Neighbor Adjacencies (Cont.)
  • Building a Link
  • -State Database
  • OSPF Packet Types
  • OSPF Packet Header Format
  • OSPF LSA Types
  • OSPF LSA Types (Cont.)
  • Compare Single
  • -Area and Multi
  • -Area OSPF
  • Compare Single
  • -Area and Multi
  • -Area OSPF (Cont.)
  • OSPF Area Structure
  • OSPF Area Structure (Cont.)
  • OSPF Network Types
  • Demo
  • - Configuring OSPFv3 using the Newer Syntax
  • OSPF Cost
  • OSPF Cost (Cont.)
  • OSPF Cost (Cont.)
  • OSPF Route Summarization
  • Route Summarization Benefits
  • Distribute List Example
  • Prefix List Example
  • Explore Route Maps
  • Route Map Applications
  • Route Map Operation
  • Route Match Statement
  • Route Map Configuration
  • Demo - OSPF Stub and Totally Stubby
8 - Network Address Translation
  • Define Network Address Translation
  • NAT Address Types
  • Explore NAT Implementations
  • Understanding Static NAT
  • Understanding Dynamic NAT
  • Understanding PAT
  • NAT Virtual Interface
  • NAT Virtual Interface (Cont.)
  • Demo - Configuring Network Address Translation
9 - Redundancy
  • Need for Default Gateway Redundancy
  • Define FHRP
  • Define FHRP (Cont.)
  • HSRP Interface Tracking
  • HSRP Interface Tracking (Cont.)
  • HSRP Interface Tracking (Cont.)
  • HSRP Load Sharing with HSRP Multigroup
  • HSRP Load Sharing with HSRP Multigroup (Cont.)
  • HSRP Load Sharing with HSRP Multigroup (Cont.)
  • HSRP Authentication
  • HSRP Versions
  • Cisco Switch High Availability Features
  • Nonstop Forwarding with Stateful Switchover on Catalyst 9400
  • Demo - HSRP
  • Demo – VRRP
10 - Spanning-Tree Protocol
  • Spanning-Tree Protocol Overview
  • Spanning-Tree Protocol Overview (Cont.)
  • BPDU
  • BPDU (Cont.)
  • Root Bridge Election
  • Root Bridge Election (Cont.)
  • Designated Port Election
  • STP Port States
  • Spanning-Tree Protocol Types and Features
  • Comparison of STP Protocols
  • Default Spanning-Tree Configuration
  • Multiple Spanning Tree Protocol
  • Multiple Spanning Tree Protocol Recommended Practices
  • Multiple Spanning Tree Protocol Recommended Practices (Cont.)
  • Demo - Multiple Spanning Tree Protocol
  • PortFast and BPDU Guard
  • PortFast and BPDU Guard (Cont.)
  • Configuring PortFast and BPDU Guard
  • Verifying PortFast and BPDU Guard
  • Verifying PortFast and BPDU Guard (Cont.)
  • Verifying PortFast and BPDU Guard (Cont.)
  • Verifying PortFast and BPDU Guard (Cont.)
11 - Virtualization and VPNs
  • Server Virtualization
  • Physical Server
  • Virtualized Server
  • Basic Virtualized Server Environment
  • Server Virtualization Benefits
  • Hypervisor: Abstraction Layer
  • VM Definition
  • Accessing vSphere Hosts Directly
  • Centralized Control of vSphere Hosts
  • Need for Network Virtualization
  • Need for Network Virtualization (Cont.)
  • Path Isolation Overview
  • Device Virtualization
  • Data Path Virtualization
  • Introducing VRF
  • Demo - VRF
  • Introducing Generic Routing Encapsulation
  • Site-to-Site VPN Technologies
  • Site-to-Site VPN Technologies (Cont.)
  • IPsec VPN Overview
  • IPSec Security Associations
  • IPsec: IKE
  • IPsec Modes
  • IPsec VPN Types
  • Dynamic Multipoint VPN
  • Cisco IOS FlexVPN
  • Cisco IOS VTI
  • Cisco IOS VTI (Cont.)
  • Cisco IOS VTI (Cont.)
  • Basic IKE Peering
  • Basic IKE Peering (Cont.)
  • Configuring Basic IKE Peering
  • Configuring Basic IKE Peering (Cont.)
  • Verifying IKE Peering
  • Verifying IKE Peering (Cont.)
  • Demo
  • - VTI
12 - Wireless Options and Services
  • RF Principles
  • Frequency
  • Watts and Decibels
  • Watts and Decibels (Cont.)
  • Antenna Power
  • Effective Isotropic
  • -Radiated Power (EIRP)
  • Antenna Types
  • Omni
  • -directional Antennas
  • Omni
  • -directional Antennas (Cont.)
  • Omni
  • -directional Antennas (Cont.)
  • Omni
  • -directional Antennas (Cont.)
  • Directional Antennas
  • Directional Antennas (Cont.)
  • Directional Antennas (Cont.)
  • 802.11n/802.11ac MIMO
  • 802.11n/802.11ac MIMO
  • – MRC
  • 802.11n/802.11ac MIMO
  • – Beamforming
  • 802.11n/802.11ac MIMO
  • – Spatial Multiplexing
  • 802.11ac MU
  • -MIMO
  • Client and AP Association
  • Split MAC
  • CAPWAP
  • MC and MA Functions
  • PoP and PoA Functions
  • Wireless Deployment Overview
  • Autonomous AP Deployment
  • Autonomous Deployment Traffic Flow
  • Cisco Autonomous Deployment Overview
  • Centralized Cisco WLC Deployment
  • Centralized Control and Provisioning of APs
  • Centralized Deployment Traffic
  • FlexConnect Deployment
  • FlexConnect Deployment Traffic Flow
  • FlexConnect Deployment Traffic Flow (Cont.)
  • FlexConnect Deployment Traffic Flow
  • FlexConnect Deployment
  • FlexConnect Deployment (Cont.)
  • Cloud Deployment and Its Effect on Enterprise Networks
  • Cloud Deployment and Its Effect on Enterprise Networks (Cont.)
  • Cloud Computing Services
  • Cloud-Managed Meraki Solution
  • Cisco Meraki Deployment Traffic Flow
  • Demo - Meraki
  • Cisco Catalyst 9800 Series Controller Deployment Options
  • Catalyst 9800 Embedded Wireless Controller
  • Catalyst 9800 Cloud Controller
  • Cisco Mobility Express
  • Wireless Roaming Overview
  • Scanning for a new AP
  • Mobility Groups and Domains
  • Wireless Roaming Types
  • Layer 2 Inter-Controller Roaming
  • Layer 2 Inter-Controller Roaming (Cont.)
  • Network Analytics
  • Cisco CMX
  • Cisco CMX Analytics Tools
  • Location Accuracy
  • Surveying Location-Based Services
  • Universal AP Priming
  • CAPWAP Discovery
  • AP Join Order
  • AP Join Phase with Master
  • AP Join Phase without Master
  • AP Fail-over
  • AP-Specific High Availability
  • N + 1 WLC High Availability
  • AP SSO High Availability
  • AP SSO High Availability (Cont.)
  • Local Mode
  • FlexConnect Mode
  • FlexConnect Mode (Cont.)
  • Bridge Mode
  • Bridge Mode (Cont.)
  • Other Modes
13 - Authenticating and Troubleshooting Wireless Clients
  • Authentication Methods
  • Pre-Shared Key (PSK) Authentication
  • PSK Authentication Process
  • 802.1X User Authentication
  • 802.1X User Authentication (Cont.)
  • PKI and 802.1X Certificate-Based Authentication
  • Asymmetric Encryption of User Credentials
  • Digital Signatures
  • Certificates and Certificate Authorities (CA)
  • Retrieving CA Certificates
  • Authentication Using Certificates
  • Introduction to Extensible Authentication Protocol (EAP)
  • EAP Frame Format
  • EAP Authentication Types
  • EAP
  • -Transport Layer Security (EAP
  • -TLS)
  • Protected Extensible
  • Authentication Protocol (PEAP)
  • EAP
  • -FAST
  • PAC Creation
  • PAC Exchange
  • EAP
  • -FAST Authentication
  • Guest Access with Web Auth
  • Local Web Authentication
  • Local Web Authentication with Auto
  • -Anchor
  • Local Web Portal with External Authentication
  • Centralized Web A
  • uthentication
  • Wireless Troubleshooting Tools
  • Spectrum Analysis
  • Spectrum Analysis (Cont.)
  • Wi
  • -Fi Scanning
  • Packet Analysis
  • Cisco AireOS GUI and CLI Tools
  • Cisco AireOS GUI and CLI Tools (Cont.)
  • Cisco Wireless Config Analyzer Express
  • Common Wireless Client Connectivity Issues
  • Client to AP Connectivity
  • Client Association with AP
  • Client Association with AP (Cont.)
  • WLAN Configuration
  • Infrastructure Configuration
14 - QoS
  • Batch Applications
  • Interactive Applications
  • Real
  • -Time Applications
  • IPv4 Header Address Fields
  • Traffic Characteristics
  • Need for Quality of Service (QoS)
  • QoS Mechanisms
  • Trust Boundary
  • Classification and Markings
  • Classification Tools
  • NBAR Advanced Classification Tool
  • Policing, Shaping, and Re
  • -Marking
  • Policing, Shaping, and Re
  • -Marking (Cont.)
  • Managing Congestion
  • Class Based Weighted Fair Queuing
  • Tools for Congestion Avoidance
  • Define and Interpret a QoS Policy
  • Method for Implementing a QoS Policy
  • MQC QoS Scenario
15 - Multicast Protocols
  • Multicast Overview
  • Multicast Overview
  • Unicast vs. Multicast
  • How Does IP Multicast Work?
  • Multicast Advantages and Disadvantages
  • IP Multicast Applications
  • IP Multicast Group Address
  • IP Multicast Group Address
  • IP Multicast Service Model
  • IP Multicast Service Model (Cont.)
  • Internet Group Management Protocol
  • IGMPv1
  • IGMPv2
  • IGMPv3
  • Source Trees
  • Shared Trees
  • IP Multicast Routing
  • PIM
  • -DM
  • PIM
  • -SM
  • PIM
  • -SM Shared Tree Join
  • PIM
  • -SM Sender Registration
  • PIM
  • -SM Sender Registration (Cont.)
  • PIM
  • -
  • SM Sender Registration (Cont.)
  • Rendezvous Point
  • Static RP
  • BSR
  • Auto
  • -RP
16 - Cisco DNA
  • Need for Digital Transformation
  • Need for Digital Transformation (Cont.)
  • Cisco Digital Network Architecture
  • Cisco Intent
  • -Based Network
  • Building Blocks of Intent
  • -Based Enterprise Networks
  • Assurance
  • Cisco DNA Center
  • Cisco DNA Center (Cont.)
  • Cisco DNA Assurance
  • Cisco DNA Assurance (Cont.)
  • Cisco DNA Assurance (Cont.)
  • Network Discovery and Management
  • Inventory Management
  • Manage Software Image
  • Network Hierarchy
  • IP Address Pools
  • Day 0 Network Provisioning
  • Day N Network Automation
  • Cisco DNA Assurance Workflow
  • Demo- DNA Center
17 - APIs
  • Application Programming Interfaces
  • Application Programming Interfaces (Cont.
  • )
  • Application Programming Interfaces (Cont.)
  • REST API Response Codes and Results
  • REST API Response Codes and Results (Cont.)
  • REST API Success Codes
  • REST API Client Error Codes
  • REST API Server Error Codes
  • REST API Security
  • REST API Security (Cont.)
  • API in DNA-Center
  • REST API in vManage
  • vManage REST API Resources
  • vManage REST API Resources (Cont.)
  • vManage REST Methods
18 - Python
  • Python Concepts
  • Python Concepts (Cont.)
  • Executing Python Code
  • Python Scripts
  • Python Helper Utilities and Functions
  • Write Idiomatic Python
  • Common Python Data Types
  • String Data Types
  • Printing Strings
  • Concatenating Strings
  • String Built in Methods
  • Variable Assignment
  • Numbers Data Types
  • Boolean Data Types
  • Conditionals
  • Conditionals (Cont.
  • )
  • Script Writing and Execution
  • Executing Scripts
  • Analyzing Code
  • Analyzing Code (Cont.)
  • Analyzing Code (Cont.)
  • Analyzing Code (Cont.)
  • Analyzing Code (Cont.)
  • Analyzing Code (Cont.)
19 - Network Tools and Services
  • Troubleshooting Concepts
  • Diagnostic Principles
  • Network Troubleshooting Procedures: Overview
  • Defining the Problem
  • Gathering Information
  • Analyzing Information
  • Eliminating Potential Causes and Proposing a Hypothesis
  • Testing a Hypothesis
  • Solving the Problem and Documenting the Solution
  • Demo
  • - Troubleshooting
  • Basic Hardware Diagnostics
  • Basic Hardware Diagnostics (Cont.)
  • Basic Hardware Diagnostics (Cont.)
  • Basic Hardware Diagnostics (Cont.)
  • Basic Hardware Diagnostics (Cont.)
  • Basic Hardware Diagnostics (Cont.)
  • Basic Hardware Diagnostics (Cont.)
  • Filtered Show Commands
  • Exclude Filter
  • Include Filter
  • Begin Filter
  • Section Filter
  • Regular Expressions in Filters
  • Regular Expressions in Filters (Cont.)
  • Cisco IOS IP SLAs
  • IP SLA Source and Responder
  • Demo
  • - IP SLAs
  • Switch Port Analyzer (SPAN)
  • Local SPAN
  • Local SPAN Configuration
  • Validating Local SPAN Configuration
  • Remote SPAN (RSPAN)
  • RSPAN Configuration
  • RSPAN Configuration (Cont.)
  • Verifying RSPAN Configuration
  • Verifying RSPAN Configuration (Cont.)
  • Encapsulated Remote Switch Port Analyzer (ERSPAN)
  • ERSPAN Configuration
  • ERSPAN Source Configuration
  • ERSPAN Destination Configuration
  • ERSPAN Verification
  • Cisco Packet Capture Tools
  • Network Time Protocol (NTP)
  • Network Time Protocol (NTP) (Cont.)
  • NTP Modes
  • Securing NTP
  • Securing NTP (Cont.)
  • Logging Services
  • Understanding Syslog
  • Syslog
  • Syslog Messages
  • Demo
  • - Logging
  • Simple Network Management Protocol (SNMP)
  • SNMP Operations
  • NetFlow
  • Analyzing NetFlow Data
  • Format of Export Data
  • Where Can NetFlow Be Implemented in the Network?
  • NetFlow Applications
  • Traditional NetFlow Configuration and Verification
  • Traditional NetFlow Configuration and Verification (Cont.)
  • Flexible NetFlow
  • Traditional vs. Flexible NetFlow
  • Demo- Flexible NetFlow
  • Cisco IOS Embedded Event Manager (EEM)
  • Demo- EEM
20 - Security
  • ACL
  • ACL (Cont.)
  • ACL (Cont.)
  • ACL Wildcard Masking
  • ACL Wildcard Masking (Cont.)
  • ACL Wildcard Masking (Cont.)
  • Wildcard Bit Mask Abbreviations
  • Types of ACLs
  • Types of ACLs (Cont.)
  • Configure Numbered Standard IPv4 ACLs
  • Configure Numbered Standard IPv4 ACLs (Cont.)
  • Configure Numbered Standard IPv4 ACLs (Cont.)
  • Configure Numbered Standard IPv4 ACLs (Cont.)
  • Configure Numbered Extended IPv4 ACLs
  • Configure Numbered Extended IPv4 ACLs (Cont.)
  • Configure Numbered Extended IPv4 ACLs (Cont.)
  • Use ACLs to Filter Network Traffic
  • Use ACLs to Filter Network Traffic (Cont.)
  • Apply ACLs to Interfaces
  • Apply ACLs to Interfaces (Cont.)
  • Apply ACLs to Interfaces (Cont.)
  • Configure Named Access Lists
  • Configure Named Access Lists (Cont.)
  • Configure Named Access Lists (Cont.)
  • Configure Named Extended ACLs
  • Demo - ACLs
  • Control Plane Overview
  • Control Plane Policing
  • Control Plane Policing (Cont.)
  • Control Plane Policing (Cont.)
  • Control Plane Policing Configuration
  • Control Plane Policing Configuration (Cont.)
  • Control Plane Policing Configuration (Cont.)
  • Control Plane Policing Verification
  • Control Plane Policing Verification (Cont.)
  • Control Plane Policing Verification (Cont.)
  • Control Plane Policing Verification (Cont.)
  • Demo - CoPP
  • Threatscape
  • Intrusion Prevention Systems
  • Virtual Private Networks
  • Content Security
  • Content Security (Cont.)
  • Logging
  • Endpoint Security
  • Personal Firewalls
  • Antivirus and Antispyware
  • Centralized Endpoint Policy Enforcement
  • Cisco AMP for Endpoints
  • Cisco AMP for Endpoints (Cont.)
  • Firewall Concepts
  • Firewall Concepts (Cont.)
  • Firewall Concepts (Cont.)
  • Firewall Concepts (Cont.)
  • TrustSec
  • SGT Classification
  • Inline SGT Support
  • Enforcement Using SGFW
  • Enforcement Using SGFW with the ASA
  • MACsec
  • Identify Management
  • Identify Management (Cont.)
  • 802.1X for Wired and Wireless Endpoint Authentication
  • 802.1X Message Flow
  • 802.1X Authorization
  • 802.1X VLAN Assignment
  • 802.1X Named ACLs
  • 802.1X Downloadable ACLs
  • 802.1X Host Modes
  • 802.1X Host Modes
  • Change of Authorization
  • 802.1X Implementation Guidelines
  • MAC Authentication Bypass
  • MAC Authentication Bypass: Benefits and Limitations
  • MAC Authentication Bypass Behavior
  • Web Authentication
  • Web Authentication (Cont.)
  • Web Authentication Process
  • Web Authentication Scenarios
  • Demo
  • - Email Security
  • Securing Device Access
  • Securing Device Access (Cont.)
  • Securing Device Access (Cont.)
  • Line Password
  • Username and Password
  • Device Hardening Options
  • AAA Framework Overview
  • Benefits of AAA
  • Authentication Options
  • RADIUS and TACACS+
  • RADIUS and TACACS+ (Cont.)
  • RADIUS AAA Communications
  • TACACS+ AAA Communications
  • Enabling AAA and Configuring a Local User for Fallback
  • Configuring RADIUS for Console and VTY Access
  • Configuring RADIUS for Console and VTY Access (Cont.)
  • Configuring TACACS+ for Console and VTY Access
  • Configure Authorization and Accounting
  • Configure Authorization and Accounting (Cont.)
21 - Software -Defined Access and WANs
  • Customer Challenges in Campus Network
  • Cisco Digital Network Architecture
  • Need for Cisco SD
  • -Access
  • Need for Cisco SD
  • -Access (Cont.)
  • Need for Cisco SD
  • -Access (Cont.)
  • Need for Cisco SD
  • -Access (Cont.)
  • Cisco SD
  • -Access Fabric Overview
  • Types of Overlay
  • Why Overlays
  • Fabric Underlay
  • - Manual vs. Automated
  • LISP and the Cisco SD
  • -Access Fabric Control Plane
  • LISP and the Cisco SD
  • -Access Fabric Control Plane (Cont.)
  • LISP Terms and Components
  • LISP Packet Flow
  • LISP Packet Flow (Cont.)
  • LISP Host Mobility Deployment Models
  • LISP Host Mobility Deployment Models (Cont.)
  • Host Mobility in LISP
  • Host Mobility in LISP (Cont.)
  • Cisco SD-Access Fabric Data Plane Based on VXLAN
  • Understanding VXLAN
  • VXLAN Encapsulation
  • VXLAN Encapsulation (Cont.)
  • VXLAN Gateways
  • VXLAN-GPO Header
  • Cisco SD-Access Fabric Policy Plane
  • Traditional Access Control
  • Role of Cisco TrustSec
  • Cisco TrustSec and Cisco ISE
  • Cisco SD-Access Fabric Policy Plane
  • Cisco SD-Access Fabric Nodes
  • Cisco SD-Access Control Plane Node
  • Cisco SD-Access Edge Node
  • Cisco SD-Access Border Node
  • Wireless LAN Controller and Fabric Mode APs
  • DNA Center and ISE Integration
  • DNA Center SD-Access Workflow
  • Cisco SD-Access Wireless Integration
  • Cisco SD-Access Wireless Integration (Cont.)
  • Cisco SD-Access Wireless Workflow – Adding WLC to Fabric
  • Cisco SD-Access Wireless Workflow – AP Join Process
  • Cisco SD-Access Wireless Workflow – Client Onboarding
  • Cisco SD-Access Wireless Workflow – Client Roaming
  • Traditional Campus Inter-operating with Cisco SD-Access
  • Traditional Campus Inter-operating with Cisco SD-Access (Cont.)
  • Need for Software Defined Networking for WAN
  • Need for Software Defined Networking for WAN (Cont.)
  • SD-WAN Components
  • SD-WAN Orchestration Plane
  • SD-WAN Management Plane
  • SD-WAN Management Plane (Cont.)
  • SD-WAN Management Plane (Cont.)
  • SD-WAN Control Plane
  • SD-WAN Data Plane
  • SD-WAN Automation and Analytics
  • SD-WAN vAnalytics
  • SD-WAN vAnalytics (Cont.)
  • Demo - SD-WAN
22 - Network Programming
  • Configuration Management
  • Configuration Management (Cont.
  • )
  • Evolution of Device Management and Programmability
  • Evolution of Device Management and Programmability (Cont.)
  • Evolution of Device Management and Programmability (Cont.)
  • Evolution of Device Management and Programmability (Cont.)
  • Evolution of Device Management and Programmability (Cont.)
  • Data Encoding Formats
  • JSON
  • JSON (Cont.)
  • JSON (Cont.)
  • JSON (Cont.)
  • JSON (Cont.)
  • JSON (Cont.)
  • JSON (Cont.)
  • JSON (Cont.)
  • JSON (Cont.)
  • JSON (Cont.)
  • JSON (Cont.)
  • JSON (Cont.)
  • Data Models
  • Data Models (Cont.)
  • YANG
  • YANG Models
  • Model Driven Programmability Stack
  • Model Driven Programmability Stack (Cont.)
  • Describe YANG
  • YANG Overvie
  • w
  • REST
  • REST (Cont.)
  • REST (Cont.)
  • REST (Cont.)
  • REST (Cont.)
  • Common HTTP Response Codes
  • Common HTTP Response Codes (Cont.) Common HTTP Response Codes (Cont.)
  • REST Tools
  • NETCONF
  • NETCONF Protocol Stack
  • NETCONF Data Stores
  • NETCONF over SSH
  • NETCONF over SSH (Cont.)
  • NETCONF over SSH (Cont.)
  • NETCONF over SSH (Cont.)
  • NETCONF over SSH (Cont.)
  • XML Encoding
  • XML Encoding (Cont.)
  • Utilities and Tools
  • NETCONF and YANG
  • NETCONF and YANG Side by Side
  • NETCONF Protocol Operations
  • NETCONF Protocol Operations (Cont.)
  • NETCONF Configuration Datastores
  • Describe RESTCONF
  • RESTCONF Methods
  • RESTCONF Sample: GET Interface
  • RESTCONF Sample: GET Interface Description
  • RESTCONF Sample: GET YANG Library Version
  • RESTCONF Sample: Invoke RPC
  • Cisco IOS XE and IOS XR Systems Overview

Target Audience

Upcoming Class Dates and Times
Login