ImplementingandOperating CiscoEnterpriseNetworkCore Technologies(ENCOR)

Transcription

eNetworkCoreTechnologies(ENCOR)CHILE – ARGENTINA – PERU – BOLIVIA – ECUADOR – URUGUAY – COLOMBIA – VENEZUELA - COSTARICA - REP. DOMINICANA – PANAMA – MEXICO – EEUU - ESPAÑA

Contenido Packet ForwardingEnterprise Network ArchitectureFabric TechnologiesNetwork AssuranceSpanning Tree ProtocolAdvanced STP TuningMultiple Spanning Tree ProtocolVLAN Trunks and EtherChannel BundlesIP Routing EssentialsEIGRPOSPFAdvanced OSPFOSPFv3BGPAdvanced BGPMulticastSecure Network Access ControlNetwork Device Access Control andInfrastructure Security QoSIP ServicesOverlay TunnelsWireless Signals and ModulationWireless InfrastructureUnderstanding Wireless Roamingand Location ServicesAuthenticating Wireless ClientsConnectivityVirtualizationFoundational NetworkProgrammability ConceptsIntroduction to Automation Tools

350-401 ENCORDesglose de temas:Packet ForwardingEnterprise Network Architecture Layer 2 ForwardingCollision DomainsVirtual LANsAccess PortsTrunk PortsLayer 2 Diagnostic CommandsLayer 3 ForwardingLocal Network ForwardingPacket RoutingIP Address AssignmentVerification of IP AddressesForwarding ArchitecturesProcess SwitchingCisco Express ForwardingCentralized ForwardingDistributed ForwardingCEFStateful SwitchoverFoundation TopicsHierarchical LAN Design ModelAccess LayerDistribution LayerCore LayerEnterprise Network ArchitectureTwo-Tier Design (Collapsed Core)Three-Tier DesignLayer 2 Access Layer (STP Based)Layer 3 Access Layer (Routed Access)Simplified Campus DesignSoftware-Defined Access (SDAccess) Design

350-401 ENCORFabric Technologies Software-Defined Access (SDAccess) What Is SD-Access? SD-Access Architecture Physical Layer Network Layer Underlay Network Overlay Network (SD-Access Fabric) SD-Access Fabric Roles andComponents Fabric Control Plane Node SD-Access Fabric Concepts Controller Layer Management Layer Cisco DNA Design Workflow Cisco DNA Policy Workflow Cisco DNA Provision Workflow Cisco DNA Assurance Workflow Software-Defined WAN (SD-WAN) Cisco SD-WAN Architecture vManage NMS vSmart Controller Cisco SD-WAN Routers (vEdge andcEdge) vBond Orchestrator vAnalytics Cisco SD-WAN Cloud OnRamp Cloud OnRamp for SaaS Cloud OnRamp for IaaSNetwork Assurance Network Diagnostic ToolspingtracerouteDebuggingConditional DebuggingSimple Network ManagementProtocol (SNMP)syslogNetFlow and Flexible NetFlowSwitched Port Analyzer (SPAN)TechnologiesLocal SPANSpecifying the Source PortsSpecifying the Destination PortsLocal SPAN ConfigurationRemote SPAN (RSPAN)Encapsulated Remote SPAN(ERSPAN)Specifying the Source PortsSpecifying the DestinationIP SLACisco DNA Center Assurance

350-401 ENCORSpanning Tree Protocol Spanning Tree ProtocolFundamentals IEEE 802.1D STP 802.1D Port States 802.1D Port Types STP Key Terminology Spanning Tree Path Cost Building the STP Topology Root Bridge Election Locating Root Ports Locating Blocked Designated SwitchPorts Verification of VLANS on Trunk Links STP Topology Changes Converging with Direct Link Failures Indirect Failures Rapid Spanning Tree Protocol RSTP (802.1W) Port States RSTP (802.1W) Port Roles RSTP (802.1W) Port Types Building the RSTP Topology Exam Preparation TasksAdvanced STP Tuning STP Topology Tuning Root Bridge Placement Modifying STP Root Port andBlocked Switch Port Locations Modifying STP Port Priority Additional STP ProtectionMechanisms Root Guard STP Portfast BPDU Guard BPDU Filter Problems with Unidirectional Links STP Loop Guard Unidirectional Link Detection

350-401 ENCORMultiple Spanning Tree Protocol Multiple Spanning Tree ProtocolMST Instances (MSTIs)MST ConfigurationMST VerificationVLAN Assignment to the ISTTrunk Link PruningMST Region BoundaryMST Region as the Root BridgeMST Region Not a Root Bridge forAny VLANVLAN Trunks and EtherChannelBundles VLAN Trunking ProtocolVTP CommunicationVTP ConfigurationVTP VerificationDynamic Trunking ProtocolEtherChannel BundleDynamic Link Aggregation ProtocolsPAgP Port ModesLACP Port ModesEtherChannel ConfigurationVerifying Port-Channel StatusViewing EtherChannel NeighborsLACPPAgPVerifying EtherChannel PacketsAdvanced LACP ConfigurationLACP System PriorityLACP Interface PriorityLoad Balancing Traffic withEtherChannel Bundles

350-401 ENCORIP Routing Essentials Routing Protocol Overview Distance Vector Algorithms Enhanced Distance VectorAlgorithms Link-State Algorithms Path Vector Algorithm Path Selection Prefix Length Administrative Distance Metrics Equal Cost Multipathing Unequal-Cost Load Balancing Static Routing Static Route Types Directly Attached Static Routes Recursive Static Routes Fully Specified Static Routes Floating Static Routing Static Null Routes IPv6 Static Routes Virtual Routing and ForwardingEIGRP EIGRP FundamentalsAutonomous SystemsEIGRP TerminologyTopology TableEIGRP NeighborsPath Metric CalculationWide MetricsMetric Backward CompatibilityLoad BalancingFailure Detection and TimersConvergenceRoute Summarization

350-401ENCORMódulo 1OSPF OSPF FundamentalsInter-Router CommunicationOSPF Hello PacketsRouter IDNeighborsDesignated Router and BackupDesignated RouterOSPF ConfigurationOSPF Network StatementInterface-Specific ConfigurationStatically Setting the Router IDPassive InterfacesRequirements for NeighborAdjacencySample Topology and ConfigurationConfirmation of InterfacesVerification of OSPF NeighborAdjacenciesVerification of OSPF RoutesDefault Route AdvertisementCommon OSPF OptimizationsLink CostsFailure DetectionHello TimerDead Interval TimerVerifying OSPF TimersDR PlacementDesignated Router ElectionsDR and BDR PlacementOSPF Network TypesBroadcastPoint-to-Point NetworksLoopback Networks

350-401 ENCORAdvanced OSPFOSPFv3 AreasArea IDOSPF Route TypesLink-State AnnouncementsLSA SequencesLSA Age and FloodingLSA TypesLSA Type 1: Router LinkLSA Type 2: Network LinkLSA Type 3: Summary LinkDiscontiguous NetworksOSPF Path SelectionIntra-Area RoutesInterarea RoutesEqual-Cost MultipathingSummarization of RoutesSummarization FundamentalsInterarea SummarizationSummarization MetricsConfiguration of InterareaSummarizationRoute FilteringFiltering with SummarizationArea FilteringLocal OSPF FilteringOSPFv3 FundamentalsOSPFv3 Link-State AdvertisementOSPFv3 CommunicationOSPFv3 ConfigurationOSPFv3 VerificationPassive InterfaceSummarizationNetwork TypeIPv4 Support in OSPFv3

350-401 ENCORBGPAdvanced BGP BGP FundamentalsAutonomous System NumbersPath AttributesLoop PreventionAddress FamiliesInter-Router CommunicationBGP Session TypesBGP MessagesBGP Neighbor StatesBasic BGP ConfigurationVerification of BGP SessionsPrefix AdvertisementReceiving and Viewing RoutesBGP Route Advertisements fromIndirect SourcesRoute SummarizationAggregate AddressAtomic AggregateRoute Aggregation with AS SETMultiprotocol BGP for IPv6IPv6 ConfigurationIPv6 Summarization BGP MultihomingResiliency in Service ProvidersInternet Transit RoutingBranch Transit RoutingConditional MatchingAccess Control ListsStandard ACLsExtended ACLsPrefix MatchingPrefix ListsIPv6 Prefix ListsRegular Expressions (regex)Route MapsConditional MatchingMultiple Conditional MatchConditionsComplex MatchingOptional ActionsThe continue KeywordBGP Route Filtering andManipulationDistribute List FilteringPrefix List FilteringAS Path ACL Filtering

350-401 ENCORAdvanced BGPMulticast Route MapsClearing BGP ConnectionsBGP CommunitiesWell-Known CommunitiesEnabling BGP Community SupportConditionally Matching BGPCommunitiesSetting Private BGP CommunitiesUnderstanding BGP Path SelectionRouting Path Selection UsingLongest MatchBGP Best Path OverviewWeightLocal PreferenceLocally Originated via Network orAggregate AdvertisementAccumulated Interior GatewayProtocolShortest AS PathOrigin TypeMulti-Exit DiscriminatoreBGP over iBGPLowest IGP MetricPrefer the Oldest eBGP PathRouter IDMinimum Cluster List LengthLowest Neighbor Address Multicast FundamentalsMulticast AddressingLayer 2 Multicast AddressesInternet Group ManagementProtocolIGMPv2IGMPv3IGMP SnoopingProtocol Independent MulticastPIM Distribution TreesSource TreesShared TreesPIM TerminologyPIM Dense ModePIM Sparse ModePIM Shared and Source Path TreesShared Tree JoinSource RegistrationPIM SPT SwitchoverDesignated RoutersReverse Path ForwardingPIM ForwarderRendezvous PointsStatic RPAuto-RPCandidate RPsRP Mapping AgentsPIM Bootstrap RouterCandidate RPs

350-401 ENCORNetwork Device Access Control andInfrastructure SecuritySecure Network Access Control Network Security Design for ThreatDefense Next-Generation Endpoint Security Network Access Control (NAC) 802.1x EAP Methods EAP Chaining MAC Authentication Bypass (MAB) Web Authentication (WebAuth) Local Web Authentication Enhanced Flexible Authentication Cisco TrustSec Ingress Classification Propagation Egress Enforcement MACsec Downlink MACsec Uplink MACsec Access Control Lists (ACLs)Numbered Standard ACLsNumbered Extended ACLsNamed ACLsPort ACLs (PACLs) and VLAN ACLs(VACLs)PACLsVACLsPACL, VACL, and RACL InteractionTerminal Lines and PasswordProtectionPassword TypesPassword EncryptionUsername and PasswordAuthenticationConfiguring Line Local PasswordAuthenticationVerifying Line Local PasswordAuthenticationConfiguring Line Local Usernameand Password AuthenticationVerifying Line Local Username andPassword AuthenticationPrivilege Levels and Role-BasedAccess

350-401 ENCORNetwork Device Access Control and Infrastructure Security Control (RBAC) Verifying Privilege Levels Controlling Access to vty Lines withACLs Verifying Access to vty Lines withACLs Controlling Access to vty Lines UsingTransport Input Verifying Access to vty Lines UsingTransport Input Enabling SSH vty Access Auxiliary Port EXEC Timeout Absolute Timeout Authentication, Authorization, andAccounting (AAA) TACACS RADIUS Configuring AAA for Network DeviceAccess Control Verifying AAA Configuration Zone-Based Firewall (ZBFW) The Self Zone The Default Zone ZBFW Configuration Verifying ZBFW Control Plane Policing (CoPP) Configuring ACLs for CoPP Configuring Class Maps for CoPP Configuring the Policy Map for CoPP Applying the CoPP Policy Map Verifying the CoPP Policy

Wireless Infrastructure350-401ENCOR Wireless LAN TopologiesAutonomous TopologyLightweight AP TopologiesPairing Lightweight APs and WLCsAP StatesDiscovering a WLCSelecting a WLCMaintaining WLC AvailabilityCisco AP ModesLeveraging Antennas for Wireless CoverageRadiation PatternsGainBeamwidthPolarizationOmnidirectional AntennasDirectional Antennas

Wireless Signals and Modulation350-401ENCOR Understanding Basic Wireless TheoryUnderstanding FrequencyUnderstanding PhaseMeasuring WavelengthUnderstanding RF Power and dBImportant dB Laws to RememberComparing Power Against a Reference: dBmMeasuring Power Changes Along the Signal PathFree Space Path LossUnderstanding Power Levels at the ReceiverCarrying Data Over an RF SignalMaintaining AP–Client CompatibilityUsing Multiple Radios to Scale PerformanceSpatial MultiplexingTransmit BeamformingMaximal-Ratio CombiningMaximizing the AP–Client Throughput

350-401ENCORAuthenticating Wireless Clients Open AuthenticationAuthenticating with Pre-Shared KeyAuthenticating with EAPConfiguring EAP-Based Authenticationwith External RADIUSServersConfiguring EAP-Based Authenticationwith Local EAPVerifying EAP-BasedAuthentication ConfigurationAuthenticating with WebAuth

350-401 ENCORQoS The Need for QoSLack of BandwidthLatency and JitterPropagation DelaySerialization DelayProcessing DelayDelay VariationPacket LossQoS ModelsClassification and MarkingClassificationLayer 7 ClassificationMarkingLayer 2 MarkingLayer 3 MarkingDSCP Per-Hop Behaviors Class Selector (CS) PHBDefault Forwarding (DF) PHBAssured Forwarding (AF) PHB 3Expedited Forwarding (EF) PHBScavenger ClassTrust BoundaryPolicing and ShapingPlacing Policers and Shapers in theNetworkMarkdownToken Bucket AlgorithmsTypes of PolicersSingle-Rate Two-ColorMarkers/PolicersSingle-Rate Three-ColorMarkers/Policers (srTCM)Two-Rate Three-ColorMarkers/Policers (trTCM)Congestion Management andAvoidanceCongestion ManagementCongestion-Avoidance Tools

350-401 ENCOROverlay Tunnels Generic Routing Encapsulation (GRE)Tunnels GRE Tunnel Configuration GRE Configuration Example Problems with Overlay Networks:Recursive Routing IPsec Fundamentals Authentication Header Encapsulating Security Payload Transform Sets Internet Key Exchange IKEv1 IKEv2 IPsec VPNs Cisco Dynamic Multipoint VPN(DMVPN) Cisco Group Encrypted TransportVPN (GET VPN) Cisco FlexVPN Remote VPN Access Site-to-Site IPsec Configuration Site-to-Site GRE over IPsec Site-to-Site VTI over IPsec Cisco Location/ID SeparationProtocol (LISP) LISP Architecture and Protocols LISP Routing ArchitectureLISP Control PlaneLISP Data PlaneLISP OperationMap Registration and NotificationMap Request and ReplyLISP Data PathProxy ITR (PITR)Virtual Extensible Local AreaNetwork (VXLAN)IP Services Time SynchronizationNetwork Time ProtocolNTP ConfigurationStratum PreferenceNTP PeersFirst-Hop Redundancy ProtocolObject TrackingHot Standby Router ProtocolVirtual Router Redundancy ProtocolLegacy VRRP ConfigurationHierarchical VRRP ConfigurationGlobal Load Balancing ProtocolNetwork Address TranslationNAT TopologyStatic NATInside Static NATOutside Static NATPooled NATPort Address Translation

350-401 ENCORVirtualizationUnderstanding Wireless Roaming andLocation Services Roaming OverviewRoaming Between Autonomous APsIntracontroller RoamingRoaming Between CentralizedControllersLayer 2 RoamingLayer 3 RoamingScaling Mobility with MobilityGroupsLocating Devices in a WirelessNetworkFoundational NetworkProgrammability Concepts Command-Line Interface Application Programming Interface Data Models and SupportingProtocols Cisco DevNet GitHub Basic Python Components andScripts Server Virtualization Network Functions VirtualizationIntroduction to Automation Tools Embedded Event ManagerEEM AppletsEEM and Tcl ScriptsEEM SummaryAgent-Based Automation ToolsPuppetChefSaltStack (Agent and Server Mode)Agentless Automation ToolsAnsiblePuppet BoltSaltStack SSH (Server-Only Mode)Comparing Tools

Load Balancing Traffic with EtherChannel Bundles. 350-401 ENCOR IP Routing Essentials Routing Protocol Overview Distance Vector Algorithms Enhanced Distance Vector Algorithms Link-State Algorithms Path Vector Algorithm Path Selection Prefix Length