Detaillierter Kursinhalt
Plan The Wired Network Solutions
- Gather customer requirements and network design
- Information gathering steps and questionnaire
- Create and use a Proof-of-Concept (POC) plan
- Creating and using a golden configuration
Troubleshooting
- Diagnostic Principles
- Troubleshooting Principles
- Troubleshooting Zones
- Troubleshooting Components
- Problem-solving methodology
- Identification and Analysis
- Hypothesis and Validation
- Implement and Verify
- Log files and debugging
- Assess and set desired debugging states
- Remote logging and log rotation
- Event and Account logging
- Password reset
- Diagnostic Commands
- Resource utilization
- Capacities and Environment
- Diagnostic tools and diag on-demand
- Support Files
- Traffic Analysis
- Mirroring concepts and configuration
- Mirroring validation
- Wireshark setup and usage
- Wireshark display filters
Monitoring and Automation Tools
- REST API
- Network Automation and REST API
- REST methods
- Using the REST interface
- Sending REST API Requests
[
- Swagger resource reference and interface
- cURL CLI tool and library
- Postman
- Network Analytic Engine
- Overview
- Scripts and agents
- Script types and sources
- NAE maximums
- Script components
- Agent functions
- Troubleshooting
- Other Monitoring
- IP SLA use and configuration
- SNMPv3 use and configuration
- NetEdit topology and logs
VSX, VSF, and Layer 2 Technologies
- VSF
- Overview
- Stack requirements
- Member roles and links
- Link failure and split detection
- Split stack link and member failures
- VSF Troubleshooting
- Status and members
- Links and topology
- Removing a VSF member
- VSX
- Overview
- Components
- Aggregation: Single routing model
- Aggegation: Multiplle VRF routing
- Virtual and System MAC guidance
- VSX Best Practices
- Nodes, bandwidth, and ISL
- Roles and synchronization
- Configuration sync
- LAG and MSTP configuration
- SVI configuration
- VSX Troubleshooting
- Status and LAG interfaces
- Configuration and VSX sync
- Debugging
- Configuration consistency
- Link/interface status
- MAC/peer consistency
- LACP interfaces
- Configuration parser
- VSX Split Brain
- Analyze down conditions and results
- Analyze failure scenarios
Layer 3 Routing and OSPF
- Static Routing
- Overview
- Default route
- Floating static routes
- Static Routes with BFD
- Routes with Tags
- Policy Based Routing
- Overview
- Configuration
- Validation
- VRF
- OSPF Single Area
- Review
- Adjacencies
- Route table vs. diagram
- Neighbor table vs. diagram
- LSDB vs diagram
- LSDB vs network types
- OSPF Multi-area
- OSPF review
- LSA types and usage
- ABRs
- Route aggregation and filtering
- Interface costs
- Passive interfaces
- Authentication
- BFD
- Best practice and troubleshooting review
BGP
- BGP Concepts and Peers
- Use case and features
- Configure BGP peers
- Sessions and states
- eBGP multihop
- iBGP full-mesh
- Validate BGP peers
- BGP Advertisement
- Three key points about BGP advertisements
- iBGP and next-hop-self
- BGP reachability requirement
- The network command
- Aggregate-address command
- BGP Metrics and Tuning
- Path selection criteria
- Prefix lists and route maps
- Weight
- Local Preference
- AS path length
- MED
- Route Control
- Reasons to control eBGP routes
- Route control implementation
- Route control validation
- Inbound route control
- Peer groups
- Route reflectors
Route Redistribution
- Intro to Redistribution
- Overview
- Redistribute static to OSPF
- Static to OSPF configuration and validation
- OSPF Type 1 vs Type 2 routes
- Using and tuning the default metric
- Compare tuning techniques
- Prefix list tuning and validation
- Redistribute OSPF to BGP
- Scenario
- Configuration
- Network statements and route maps
- Advanced Route Redistribution
- Scenario
- AS-path list
- Improve BGP convergence times
- Route tags
VRF and Route Leaking
- VRF Overview and Configuration
- Overview
- Configuration
- Verification
- VRF Route Leaking
- Methods
- Restrictions and limitations
- Static route leaking configuration and validation
- Dynamic route leaking configuration and validation
Multicast
- Multicast
- Introduction
- IP address assignments
- Network Access and L2 Multicast
- Switching multicast frames
- MAC address mapping
- IGMP – v1, v2, v3
- IGMPv3 messages – membership report, querier election,
- IGMPv3 Snooping
- IGMPv3 Configuration and verification
- VSX and IGMPv3
- IP Multicast at Layer 3
- Overview
- Tree types Shared/RP, source/SPF trees
- Group states
- RPF
- PIM
- Versions
- Messages
- PIM-SIM
- Designated Routers
- Rendezvous Point
- Build-up process
- Wireshark analysis
- RP Configuration
- Static RP
- Dynamic RP
- BSR mechanism
- Wireshark analysis
- VSX and PIM
- Multicast Deployment
- Overview
- PIM Configuration
- Multicast Troubleshooting
QoS
- Quality of Service
- Overview
- Traffic characterization
- Differentiated Services model
- AOS-CX QoS processing
- Ingress Stage
- Rate Limiting
- Configuration
- Verification
- Prioritization Stage
- Classifier and Class of service
- Marking and Trust
- Configuration and Verification
- Queuing Stage
- Configuration and verification
- Scheduler Stage
- Strict Priority
- DWRR and WFQ
- Configuration and verification
- Remark QoS
- Configuration
- Verification
Dynamic Segmentation
- Overview
- Objective and benefits
- Port-based vs user-based tunneling
- UBT components
- Understanding UBT
- Tunnel establishment
- Role assignment and redirection
- Infrastructure requirements
- Broadcast and multicast traffic
- Configuration and Wireshark analysis
- Verification commands
- Deployment Using NetEdit
- Configure dynamic segmentation using NetEdit
- Verify dynamic segmentation using NetEdit
Network Security
- Access Control Lists
- Overview
- Applying ACLs
- Object Groups
- ACL verification
- Counting and logging
- ACL resource utilization
- Classifier Policies
- Overview
- Configuration
- Application
- Verification
- Control Plane Policing
- Overview
- Configuration
- Verification
- Local User and Group Management
- Local AAA
- Built-in user groups
- User-defined user groups
- TACACS+ Management
- Remote AAA using TACACS+
- Communication with TACACS+ server
- Configure and verify AAA using TACACS+
- DHCP Snooping and ARP Inspection
- DHCP snooping configuration and verification
- Dynamic ARP operation, configuration, and verification
IPv6
- IPv6
- Features
- Headers
- Extension headers
- Address representation
- Address Types
- Unicast
- Multicast
- Anycast
- ICMPv6
- Overview
- Neighbor discovery
- Manual IPv6 Addressing
- Configuration
- Verification
- DAD
- Dynamic IPv6 Addressing
- Router Advertisements
- SLAAC
- DHCPv6
- IPv6 Routing
- Static
- OSPFv3
- IPv6 Access Control Lists
- Configuration
- Verification