Introduction-Associate

IPv4 Addressing & Subnetting

Introduction to Networking

  • Introduction to Networks
  • Network Types
  • The Internet & DNS

Introduction to IPv4 Addressing

  • IPv4 Addressing
  • IPv4 Address Classes
  • Private IPv4 Addressing

IPv4 Subnetting and Supernetting

  • IPv4 Subnetting
  • Subnetting - Class C Examples
  • Subnettting - Class B Examples
  • Subnetting - Class A Examples
  • IPv4 Supernetting
  • IPv4 Supernetting - Examples

IPv4 Variable Length Subnet Masks (VLSM)

  • VLSM
  • VLSM - Class C Example
  • VLSM - Class B Example
  • VLSM - Class A Example

IPv6 Addressing & Subnetting

Introduction to Networking

  • Introduction to Networks
  • Network Types
  • The Internet & DNS

Introduction to IPv6 Addressing

  • IPv6 Addressing
  • IPv6 Address Types
  • IPv6 Subnetting

CCNA

Introduction to Networking

  • Introduction to Networks
  • Network Types
  • The Internet & DNS

Introduction to IPv4 Addressing

  • IP Addressing
  • IP Address Classes
  • Private IP Addressing

IPv4 Subnetting & Supernetting

  • IPv4 Subnetting
  • Subnetting - Class C Examples
  • Subnetting - Class B Examples
  • Subnetting - Class A Examples
  • IPv4 Supernetting
  • IPv4 Supernetting - Examples

Reference Models

  • Reference Models Overview
  • OSI Reference Model
  • DOD Reference Model

Initializing a Cisco Router

  • Router Components
  • Basic Router Configuration
  • Initial Router Configuration
  • Configuring Terminal history
  • Configuring a Router Banner
  • Working with the Configuration Files
  • Securing the Router Console Access
  • Creating Alias

WAN Connections [PPP, Authentication, MLPP]

  • Serial Interface Protocols
  • Configuring and Verifying Point-to-point HDLC Connections
  • Configuring and Verifying Point-to-point PPP Connections
  • Configuring PPP Authentication using PAP
  • Configuring PPP Authentication using CHAP
  • Configuring PPP Multilink

Remote Management [Telnet & SSH]

  • Remote Management
  • Configuring Telnet using a Password
  • Configuring Telnet using an Username and Password
  • Configuring SSH using an Username and Password

IP Routing

  • Routing Basics
  • Distance Vector Routing Protocol
  • Link State Routing Protocol
  • Configuring Static Routes
  • Configuring Default Routes
  • Configuring Floating Static
  • OSPF Overview
  • Configuring OSPF in a Single Area on a Point - To - Point Link
  • Configuring OSPF in a Single Area on a Ethernet Link
  • OSPF - Calculating Metrics
  • OSPF Multi-Area Overview
  • Configuring OSPF is a Multi-Area Network
  • FHRP Services
  • HSRP
  • VRRP
  • BGP Overview
  • Configuring eBGP

IPv6 [Addressing, Static Routes, OSPFv3]

  • IPv6 Addressing Overview
  • IPv6 Address Types
  • IPv6 Subnetting
  • Assigning IPv6 Address to Routers Manually
  • Assigning IPv6 Address to Routers using SLAAC
  • Configuring IPv6 Static Routes
  • Configuring IPv6 Default Routes
  • Configuring OSPFv3

LAN Switching

  • Switching Overview
  • VLANs & Port Types
  • VLAN Trunking Protocol (VTP)
  • VLAN, VTP & Port Types Lab
  • Inter-VLAN Routing
  • Physical - To - Logical Mapping
  • Spanning-Tree Protocol (STP)
  • STP Root Switch
  • STP PortFast
  • STP BPDU Guard
  • STP BPDU Guard Lab
  • EtherChannels - Port Channels
  • EtherChannel - Static Mode
  • EtherChannel - LACP

Infrastructure / IP Services [DNS, DHCP Server, NTP, QOS]

  • DHCP Services
  • Configuring a Router as a DHCP Server
  • Configure a Router as a DHCP Relay Agent
  • Configuring a Router as a HTTP-HTTPS Server
  • Configuring a Router as a DNS Server
  • Network Address Translation (NAT)
  • Dynamic NAT
  • Static NAT
  • Dynamic PAT
  • Static PAT
  • Network Time Protocol (NTP)
  • Network Time Protocol Lab
  • Quality of Service (QoS)
  • Qos - Policing
  • Qos - Bandwidth Reservation & Prioritization

Router Maintenance

  • Backing up configuration to a TFTP Server
  • Restoring configuration from a TFTP Server

Wireless Networking

  • Wireless Networking Overview
  • Initializing the WLC from the CLI
  • Configuring a Controller-based WLAN

Security Fundamentals

  • Overview of Site - To - Site VPNs using Crypto Maps
  • GRE Over IPSec
  • Tunnel-Interface Based IPSec - S-VTI
  • Access Control Lists Overview
  • Standard Numbered ACL
  • Standard Named ACL
  • Extended Numbered ACL
  • Extended Named ACL
  • Time-based ACL
  • IPv6 Access Lists
  • Port Security
  • Port Security - Lab
  • Configuring DHCP Snooping
  • Configuring ARP Inspection

Router Protocols - Extra

  • RIPv2 Overview
  • Configuring Basic RIPv2
  • RIPv2 - Passive Interfaces
  • RIPv2 - Auto-Summarization
  • EIGRP Overview
  • Configuring Basic EIGRP
  • EIGRP - Auto-Summarization
  • EIGRP - Passive Interfaces
  • Calculating EIGRP Metrics
  • EIGRP - Load Balancing
  • BGP Overview
  • Configuring eBGP

WAN Technologies

  • WAN Technologies Overview
  • MPLS Unicast Routing
  • Multi-Point GRE- DMVPN
  • PPP Over Ethernet (PPPoE)

Routing - IPv4

IPv4 - OSPF

Basic OSPF Configuration

  • OSPF Overview
  • OSPF - Network Statement
  • OSPF - Passive Interface
  • OSPF Calculating Metric
  • OSPF on a Multi-Access Segment
  • OSPF on a Serial Link
  • OSPF on a Loopback Interface
  • OSPF - Unicast Neighbors

OSPF LSAs

  • OSPF LSA Type 1 - Router LSA
  • OSPF LSA Type 2 - Network LSA
  • OSPF LSA Type 3 - Summary LSA
  • OSPF LSA Type 5 - External LSA
  • OSPF LSA Type 4 - ASBR Summary LSA
  • LSA's Recap

OSPF Multi-Area & Multi-Domain Functionalities

  • Configuring a Multi-Area - Multi-Domain Network
  • Configuring LSA Type 3 Filtering
  • Configuring Manual Inter-Area Route Summarization
  • Configuring Manual External Route Summarization
  • Configuring Clear Text Authentication
  • Configuring MD5-based Authentication

OSPF Area Types

  • Configuring a Stub Area
  • Configuring a Totally Stubby Area
  • Configuring a Not-So-Stubby-Area (NSSA)
  • Configuring a NSSA - Stub Area
  • Configuring a NSSA - Totally Stubby Area

Redistribution in OSPF

  • Configuring the Multi-Domain Topology for Redistribution
  • Redistributing EIGRP & OSPF
  • Redistributing Static Routes
  • Redistrubuting Connected
  • Redistributing with Route-Filtering
  • Redistributing with Route-Tagging

OSPF Advanced

  • Single-Tier Virtual Link
  • Multi-Tier Virutal Link
  • Configuring BFD with OSPF
  • Configuring IP FRR with OSPF

IPv4 - BGP

Basic eBGP Configuration

  • BGP Overview
  • Configuring Basic eBGP
  • Injecting Routes into BGP using Network Statements
  • Injecting Routes into BGP using Redistribution - Connected
  • Configuring IGP Redistribution into BGP
  • BGP Authentication using MD5
  • BGP Multi-Hop

iBGP Configuration

  • Configuring Underlay Routig Protocol for iBGP
  • Configuring iBGP using Loopbacks
  • Configuring iBGP with Next-Hop-Self
  • Configuring Route-reflectors - Basic
  • Configuring Peer-Groups

Filtering & Summarization

  • Access-lists & Prefix-Lists
  • Configuring Route-Filtering in BGP - ACL
  • Configuring Route-Filtering in BGP - Prefix-List
  • Configuring Route-Filtering in BGP - AS Path Filter
  • Configuring Route Aggregation with Filtering
  • Configuring Route Aggregation with Summary-Only
  • Configuring Route Aggregation with Suppress-Maps
  • Configuring Route-Aggregation with Unsuppress Maps

Security Technologies

Implementing a Cisco ASA 9.x Firewall

Overview and Basic Initialization

  • ASA Overview and Traffic Flow
  • Basic Initialization

Configuring Routing on the ASA

  • Routing on the ASA - Static Routes
  • Routing on the ASA - RIPv2
  • Routing on the ASA - EIGRP
  • Routing on the ASA - OSPF
  • Routing on the ASA - BGP

Traffic Flow

  • Controlling Thru Traffic Using an Access Control Lists (ACL)
  • Controlling Traffic to the Firewall

Remote Management

  • Remote Management Access to the Firewall
  • Configuring Management Access Using TELNET
  • Configuring Management Access Using SSH
  • Configuring Management Access Using HTTP using ASDM

Network Address Transalation (NAT)

  • Overview of NAT and Dynamic NAT
  • Static NAT
  • Destination NAT
  • Dynamic PAT
  • Static PAT
  • Policy NAT

Transparent Layer 2 Firewall

  • Overview and Basic Initialization of Transparent Firewall
  • Routing Thru a Transparent Firewall
  • Ethertype ACLs on a Transparent Firewall

Virtualization and Redundancy

  • Redundant Interfaces
  • Port-Channels
  • Security Contexts
  • Active Standby Failover - Stateless
  • Active Standby Failover - Stateful
  • Active Active Failover
  • ASA Clustering Overview
  • ASA Clustering - Spanned Mode

Deep Packet Inspection (DPI)

  • Deep Packet Inspection Overview
  • DPI - ICMP Inspection
  • DPI - FTP on a Non-Standard Port

Virtual Private Networks (VPNs)

  • IPSec Overview
  • Site-To-Site IPSec thru a Firewall - without NAT-T
  • Site-To-Site IPSec thru a Firewall - with NAT-T
  • LAN-To-LAN VPN between a Router and an ASA
  • Configuring ASDM for Management
  • Configuring WebVPN
  • Remote Access VPN using AnyConnect

Virtual Private Networks (VPNs)

Basic VPNs

  • VPN Overview
  • LAN-To-LAN Tunnel without NAT-T
  • LAN-To-LAN Tunnel with NAT-T
  • Point-to-Point GRE
  • Encrypting GRE Tunnels using IPSec
  • IPSec Tunnel Interface - Static Virtual Tunnel Interface

Advanced VPNs

  • Multipoint GRE (mGRE) Tunnel
  • Configuring DMVPN – Phase I
  • Configuring DMVPN – Phase II
  • Configuring DMVPN – Phase III
  • Configuring DMVPN Phase III with Dual Hub
  • Encrypting DMVPN Traffic using IPSec
  • Configuring GETVPN-small
  • Configuring GETVPN with Redundancy
  • Configuring VRF aware VPN
  • Configuring a Router as a CA Server

Configuring VPNs using IKEV2

  • Site-To-Site IPSec VPN using IKEv2 – Crypto Maps
  • Site-To-Site IPSec VPN using IKEv2 – S-VTI

Configuring FLEX VPNs

  • Site-To-Site IPSec VPN using IKEv2 – Crypto Maps
  • Site-To-Site IPSec VPN using IKEv2 – S-VTI

ASA VPNs

  • Site-To-Site IPSec thru a Firewall - without NAT-T
  • Site-To-Site IPSec thru a Firewall - with NAT-T
  • LAN - To -LAN VPN between a Router and an ASA
  • Configuring ASDM for Management
  • Configuring WebVPN
  • Remote Access VPN using AnyConnect

Firepower Threat Defense (FTD)

Overview of FTD & Basic Configuration

  • Overview of FTD - Video
  • Initializing the FMC - CLI
  • Initializing the FMC - GUI
  • Initializing the FTD - CLI
  • Integrating FTD with FMC
  • Basic Intialization of FTD Interfaces

Routing on the FTD

  • Routing Configuration - Static Routing
  • Routing Configuration - OSPF
  • Redsitributing Static Routes into OSPF
  • Routing Configuration - RIPv2 with Redistribution
  • Routing Configuration - BGP
  • Verifying Routing on the Routers
  • Allowing traffic thru the FTD using a Basic Access Control Policy
  • Review of Basic Setup & EIGRP Flex Config

Network Address Translation (NAT)

  • Overview of NAT
  • Dynamic NAT
  • Static NAT
  • Dynamic PAT
  • Static PAT
  • Policy NAT- Manual NAT
  • ACP Using L3-L4 Characteristics
  • Verifying NAT & ACP

Access Control Policy (ACP) - Advanced

  • Geo Location based Blocking
  • URL Filtering
  • Access Control Policy Analysis
  • Application Visibility Control (AVC) Control
  • Logging & Alerting
  • Intrusion Prevention Overview
  • Intrusion Prevention Policies - Default Policies
  • Intrusion Prevention Policies - Custom Policies
  • Network AMP-File Policies
  • Packet flow thru the FTD
  • Creating the Pre-Filter

Redundancy & Multi-Instance

  • Redundancy & Multi-Context Overview
  • Configuring Active-Standby Failover
  • Multi-Instance Overview
  • Verifying Active-Standby Failover

Transparent Firewalls

  • Configuring a Transparent Firewall Overview
  • Configuring Transparent Firewall - CLI
  • Configuring Transparent Firewall - GUI
  • Configuring the Access Policy

ISE

Overview and Initialization of ISE

  • Overview of ISE
  • Configuring the base network for Wired ISE
  • ISE Common CLI Configurations
  • ISE Initial Configuration in GUI

Integrating ISE and Switch for 801.1X Authentication

  • Configure the relationship between ISE & Switch
  • Create Groups and Assign Users to them
  • Create an Authorization Profile to specify the VLAN to be assigned
  • Configure an Authorization Policy to link the Group to the Profile
  • Configuring the Switch for Dot1x Authentication use the ISE Configuration Validator Tool
  • Configuring the SVIs and DHCP Pools on SW2
  • Configuring the Clients for Dot1x Authentication and Verifying the VLAN Assignments
  • Downloadable ACLs (DACLs)

Configuring ISE for a Wireless Network

  • Configuring the Wired Topology including Smart Macro
  • Configuring Routing Protocols for the Wired Topology
  • Configuring DHCP & DHCP Relay Agent for a wireless network to register the AP to the WLC
  • Registering APs to WLC - Manual Configurations
  • Initializing the WLC - CLI
  • Verifying AP registrations on the WLC
  • Configuring a Wifi Network - Controller-based Central Switched

Integration ISE & WLC

  • Integrating ISE & WLC for Authentication
  • Create Groups and Assign Users to them
  • Create an Authorization Profile to specify the VLAN to be assigned
  • Configure an Authorization Policy to link the Group to the Profile
  • Configuring WLAN using WPA+WPA2 (802.1x with ISE)
  • Recap of ISE-WLC Integration and DACL

Integrating Active Directory & ISE

  • Add Active Directory to ISE
  • Incorporating the AD Groups into your Policy
  • Using AD with Certificate based Authentication

Configuring MAB

  • Configuring MAB for Access Points

Device Administration using ISE

Overview and Initialization of ISE

  • Device Administration Overview
  • Configuring Network Devices in NDGs using TACACS+ & RADIUS

Overview of AAA

  • Authentication Overview
  • Authorization Overview
  • Accounting Overview

Configuring Device Administration using TACACS+

  • Using TACACS+ for Authentication, Authorization & Accounting for Routers - Routers
  • Using TACACS+ for Authentication, Authorization & Accounting for Routers - ISE
  • Using TACACS+ for Authentication, Authorization & Accounting for Routers - Verification
  • Using TACACS+ for Authentication, Authorization & Accounting for Switches - Switches
  • Using TACACS+ for Authentication, Authorization & Accounting for Switches - ISE
  • Using TACACS+ for Authentication, Authorization & Accounting for Switches - Verifications
  • Using TACACS+ for Authentication, Authorization & Accounting for WLC - WLC
  • Using TACACS+ for Authentication, Authorization & Accounting for WLC - ISE
  • Using TACACS+ for Authentication, Authorization & Accounting for WLC - Verification
  • Using TACACS+ for Authentication, Authorization & Accounting for ASA - ISE
  • Using TACACS+ for Authentication, Authorization & Accounting for ASA - ASA
  • Using TACACS+ for Authentication, Authorization & Accounting for ASA - Verification

Configuring Device Administration using RADIUS

  • Using RADIUS for Authentication & Accounting for Routers - Routers
  • Using RADIUS for Authentication & Accounting for Routers - ISE
  • Using RADIUS for Authentication & Accounting for Routers - Verification
  • Using RADIUS for Authentication & Accounting for Switches - Switches
  • Using RADIUS for Authentication & Accounting for Switches - ISE
  • Using RADIUS for Authentication & Accounting for Switches - Verification
  • Using RADIUS for Authentication & Accounting for WLC - WLC
  • Using RADIUS for Authentication & Accounting for WLC - ISE
  • Using RADIUS for Authentication & Accounting for WLC - Verification

Web Security Appliance (WSA)

Overview and Initialization of WSA

  • Overview of WSA
  • Configuring the base network for WSA
  • Initialization of WSA from CLI
  • Initialization of WSA from GUI

Configuring Transparent Redirection

  • Configure the WCCP Relationship between the WSA & Router - WSA
  • Configure the WCCP Relationship between the WSA & Router - Router
  • Verifying Transparent Redirection

Configuring Identities & Access Policies

  • Configure Identities
  • Configure Access Policies to block specific Sites for Specific Identities

Configuring Custom Categories

  • Configuring Custom Categories - Whitelist
  • Using Custom Categories in your Access Policies - Whitelist
  • Configuring Custom Categories - Blacklist
  • Using Custom Categories in your Access Policies - Blacklist

E-Mail Security Appliance (ESA)

Overview Mail and ESA

  • Overview of E-Mail propagation
  • Forwarding E-Mails normally without an ESA
  • Overview of ESA

Initializing & Configuring the ESA Appliance

  • Initialization of ESA from CLI
  • Initialization of ESA from GUI
  • Configuring the ESA as the Relay Host
  • Re-configuring the DNS Server
  • Verifying of forwarding of the E-mails thru the ESA

Configuring Custom Filters

  • Configure Outgoing Content Filters
  • Configure Incoming Content Filters
  • Configure Incoming Mail Policy
  • Configure Outgoing Mail Policy
  • Verifying the use of the Mail Policy

Data Center Technologies

Configuring the Nexus Series Switches (NX-OS)

Creating and Initializing VDCs

  • Creating VDC
  • Initial VDC Setup
  • Management Interface
  • Nexus Features
  • Aliases & Saving VDC Configs
  • Interface Identifications

Introduction to Nexus OS

  • Checkpoint & Rollback Commands
  • Trunking & VLANs
  • Creating SVIs
  • Configuring a Port-Channel - Static
  • Configuring a Port-Channel - LACP
  • Configuring IP ACLs
  • Remote Management

Configuring STP

  • Configuing Rapid-PVSTP
  • Rapid-PVTP Optimizations
  • Configuring MST

Configuring Routing

  • Configuring the L3 Topology
  • Configuring Static Routes
  • Configuring EIGRP
  • Configuring OSPF

Configuring vPC

  • vPC Overview
  • Configuring a vPC

Configuring FHRP

  • Overview of FHRP
  • Configuring HSRP
  • Configuring VRRP
  • vPC Peer-Gateway

FEX

  • Overview of FEX
  • Configuring FEX with Port-Channels
  • Configuring FEX with vPCs

Configuring VXLAN

  • Overview of VXLAN
  • Configuring VXLAN - Base configuration
  • Configuring VXLAN - L2VNI
  • Configuring VXLAN - L3VNI

Configuring OTV

  • Overview of OTV
  • Configuring OTV - Unicast-based
  • Configuring OTV - Multicast-based

Configuring FabricPath

  • Overview of FabricPath
  • Configuring FabricPath
  • Configure FabricPath with vPC (vPC+)

Implementing and Understanding Cisco ACI

ACI Technology Overview

  • ACI Overview
  • Understanding Spines, Leaf's & APICs
  • Physical Connectivity & Bootstraping the APIC
  • Fabric Discovery Process
  • Understanding the Traffic Flow within ACI

Access Policies Provisioning

  • Configuring Interface Policies
  • Configuring Interface Policy Groups (IPG)
  • Configuring Interface Profiles
  • Configuring Switch Profiles
  • Configuring Port-Channels & Virtual-Port Channels
  • Overview of VLANs & Port Types
  • Configuring VLAN Pools
  • Configuring Domains
  • Configuring AAEPs

Tenant Provisioning

  • Tenant Overview
  • Creating the Tenant
  • Creating the VRF
  • Creating the Bridge Domains & SVI

Application Provisioning

  • Application Profile Overview
  • Create the Application Profile
  • Create the appropriate EPGs & Assign Ports to the EPGs
  • Create the Contract,Subjects & Filters and specify the appropriate access
  • Provision the Contract as either Provided or Consumed Contract

External Domains

  • Access-Provisioning, Tenant Provisioning & Application Provisioning - Lab 2
  • L2-OUT Overview
  • Configuring External Bridge Domain - Trunks, Port Channels & vPCs
  • Configuring Contracts between External Bridge domains & AC
  • L3-OUT Overview
  • Configuring BGP in the Fabric with Spines as RRs
  • Configuring L3OUT using - EIGRP
  • Configuring L3OUT using - OSPF
  • Configuring Transit Routing thru the ACI Fabric

Configuring Additional Features

  • Configure an External Firewall Integration
  • Configure a VMM Domain Integration

Multi-Pod/Multi-Site

  • Multi-Pod-Multi-Site Overview

Service Provider Technologies

Configuring L3 Intra-AS MPLS VPNs – IOS-based

MPLS Unicast Routing

  • Overview of Packet Switching Technologies
  • Overview of Label Forwarding
  • Configuring Unicast Routing on the Core Routers
  • Configuring a BGP-Free Core with MPLS Unicast Routing

Configuring Intra-AS MPLS VPNs

  • MPLS VPN Overview
  • Configuring the VRF on the PE Router - CUST-A
  • Running RIPv2 as the PE-CE Routing Protocol
  • Running OSPF as the PE-CE Routing Protocol
  • Configuring MP-BGP on the PE Routers to configure Intra-AS MPLS VPN - CUST-A
  • MPLS Route Propagation Flow for Verification & Troubleshooting
  • Configuring EIGRP as the PE-CE Routing Protocol
  • Configuring Static & Default Route between PE-CE
  • Configuring BGP as the PE-CE Protocol
  • Configuring BGP as the PE-CE Protocol - AS-Override & Allowas-In
  • Understanding the Traffic Flow thru MPLS VPN

Configuring Advanced Features

  • Overview of MPLS VPN Extranets
  • Configuring MPLS VPN Extranets Using Export-Maps
  • Configuring OSPF - SuperBackone
  • Configuring OSPF - Domain-ID
  • Configuring OSPF - Shamlink
  • Configuring an Intra-AS MPLS-VPN using a VPNv4 Route Reflector

Configuring L3 Inter-AS MPLS VPNs – IOS-based

Configuring Intra-AS MPLS VPN - AS # 100

  • Overview of Inter-AS MPLS VPN
  • Configuring OSPF as the Core SP IGP
  • Configuring MPLS Unicast Routing
  • Configuring MP-iBGP with Route Reflectors
  • Configure the PE-Routers with VRF & PE-CE Routing using BGP
  • Configuring CE Routers

Configuring Intra-AS MPLS VPN - AS # 200

  • Configuring IS-IS as the Core SP IGP
  • Configuring MPLS Unicast Routing
  • Configuring MP-iBGP with Route Reflectors
  • Configure the PE-Routers with VRF & PE-CE Routing using BGP
  • Configuring CE Routers

Configuring Inter-AS MPLS VPN Options

  • Inter-AS MPLS-VPN - Option A - Back-To-Back VRF
  • Configuring Inter-AS MPLS-VPN - Option A
  • Inter-AS MPLS-VPN - Option B - ASBR - MP-eBGP
  • Configuring Inter-AS MPLS-VPN - Option B
  • Traffic flow for Option B & Review of Option B
  • Inter-AS MPLS-VPN - Option C - RR - MP-eBGP
  • Configuring Inter-AS MPLS-VPN - Option C
  • Configuring Inter-AS MPLS-VPN - Option C with Next-Hop-Unchanged
  • Inter-AS MPLS-VPN - Option D - Non-VPN Transit Provider
  • Configuring Inter-AS MPLS-VPN - Option D

Configuring Carrier Supporting Carrier (CSC)

  • Overview of CSC
  • CSC - Carrier SP IP-Based
  • CSC - Carrier SP Running MPLS-Unicast Routing
  • CSC - Configuring Hierarchical MPLS VPN (H-MPLS VPN)

Configuring L3 Intra-AS MPLS VPNs – IOS-XR-based

Basic IOS-XR Configuration - AS-100

  • Configuring Interfaces on IOS-XR
  • Configuring OSPF on IOS-XR
  • Configuring LDP on IOS-XR
  • Configuring Configuring MP-BGP on IOS-XR
  • Configure the PE-Routers with VRF & PE-CE Routing using BGP
  • Configure CE Routers - IOS
  • Configure the Route Policy for eBGP Neighbors

Basic IOS-XR Configuration - AS-200

  • Configuring Interfaces on IOS-XR
  • Configuring IS-IS on IOS-XR
  • Configuring LDP on IOS-XR
  • Configuring Configuring MP-BGP on IOS-XR
  • Configure the PE-Routers with VRF & PE-CE Routing using BGP
  • Configure CE Routers - IOS

Configuring Inter-AS using Option C

  • Option C Overview
  • Configuring Route Leaking
  • Configuring eBGP between ASBRs for labeled IPv4 Routing
  • Configuring the ASBR to redistribute BGP into IGP
  • Configuring MP-eBGP between RR's
  • Configuring PE Routers to Import Remote RTs

Segment Routing - Intro to Advanced

  • Segment Routing - Technology Overview
  • Configuring Intra-AS MPLS Labeling using Segment Routing - AS 100
  • Configuring OSPF for Segment Routing - AS100
  • Verifying Segment Routing - AS100
  • Configuring Intra-AS MPLS Labeling using Segment Routing - AS 200
  • Configuring IS-IS for Segment Routing - AS200
  • Configuring BGP for Segment between the ASBR with Route Leaking

Configuring Inter-AS MPLS VPNs – IPv6

Configuring Intra-AS MPLS VPN - AS # 100

  • Overview of MPLS VPNv6
  • Configuring SP Core IGP - OSPF - AS 100
  • Configuring SP Core MPLS Unicast Routing - AS 100
  • Configuring MP-eBGP VPNv6 - AS 100
  • Configuring the PE Routers - VRF, Interface & BGP - AS 100
  • Configuring the CE Routers - Interface & BGP - AS 100

Configuring Intra-AS MPLS VPN - AS # 200

  • Configuring SP Core IGP - IS-IS - AS 200
  • Configuring SP Core MPLS Unicast Routing - AS 200
  • Configuring MP-eBGP VPNv6 - AS 200
  • Configuring the PE Routers - VRF, Interface & BGP - AS 200
  • Configuring the CE Routers - Interface & BGP - AS 200

Configuring Inter-AS MPLS VPN Options

  • Inter-AS MPLS VPN Overview
  • Inter-AS MPLS for IPv6 - Option - A
  • Inter-AS MPLS for IPv6 - Option - B
  • Inter-AS MPLS for IPv6 - Option - C
  • Inter-AS MPLS for IPv6 - Option - D

Configuring Inter-AS MPLS VPN Options - Dual Stack

  • Configuring Intra-AS MPLS VPN VPNv4 - AS 100
  • Configuring Intra-AS MPLS VPN VPNv4 - AS 200
  • Configuring Inter-AS MPLS VPN VPNv4 - VPNv4 Dual Stack

Configuring L2 MPLS VPNs, MPLS TE & MPLS QoS

Configuring MPLS L2VPN using AToM

  • Overview of Layer 2 VPNS
  • Configuring MPLS Unicast Routing on the Core Routers
  • Configuring MPLS AToM - Ethernet Physical Interfaces
  • Configuring MPLS AToM - Serial HDLC
  • Configuring MPLS AToM - Serial PPP
  • Configuring MPLS AToM - Ethernet Sub-interfaces
  • Configuring MPLS AToM - Interworking Ethernet & PPP

Configuring MPLS L2VPN using L2TPv3

  • Overview of L2TPv3 and Base Setup
  • Configuring L2TPv3 L2VPN

Configuring MPLS L2VPN using VPLS

  • Overview of VPLS
  • Configuring VPLS

Configuring MPLS Traffic Engineering

  • Overview of MPLS TE
  • Base Network Setup
  • Configure Traffic Engineering on the Routers
  • Configuring RSVP
  • Configuring Static Tunnels from R1-R4
  • Configuring Static Tunnels from R1-R3
  • Configuring Static Tunnels from R1-R2
  • Configuring Static Tunnels from R2-R4
  • Configuring Static Tunnels from R2-R1
  • Configuring Static Tunnels from R3-R1 with Preemption
  • Configuring Dynamic Tunnels from R1-R4
  • Configuring Dynamic Tunnels from R1-R3
  • Configuring Dynamic Tunnels from R1-R2
  • Configuring Dynamic Tunnels from R2-R1
  • Configuring Dynamic Tunnels from R2-R4
  • Configuring IS-IS for Traffic Engineering
  • Overview of MPLS-TE with FRR
  • Configuring MPLS-RE with FRR

Configuring MPLS Quality of Server (QoS)

  • Overview of MPLS QoS

Configuring Inter-AS MPLS VPN Using Segment Routing

Configuring Intra-AS MPLS VPN - AS # 100

  • Segment Routing - Technology Overview
  • Configuring Intra-AS MPLS Labeling using Segment Routing - AS 100
  • Configuring OSPF for Segment Routing - AS100
  • Verifying Segment Routing - AS100

Configuring Intra-AS MPLS VPN - AS # 200

  • Configuring Intra-AS MPLS Labeling using Segment Routing - AS 200
  • Configuring IS-IS for Segment Routing - AS200

Configuring Inter-AS MPLS VPN Options

  • Configuring BGP for Segment between the ASBR with Route Leaking

Wireless Technologies

Configuring Wireless Networks using Cisco WLC and ISE

Network Infrastructure – Layer 2

  • VLANs & Port Types
  • VTP
  • VLAN, VTP & Port Types Lab
  • Spanning-Tree Protocol (STP)
  • Physical - To - Logical Mapping - Intro

Network Infrastructure – Routing

  • HSRP
  • DHCP Services
  • Configuring a Router as a DHCP Server
  • Configure a Router as a DHCP Relay Agent
  • Network Time Protocol (NTP)
  • Network Time Protocol Lab
  • Configuring Static Routes
  • Configuring Default Routes
  • EIGRP Overview
  • Configuring Basic EIGRP
  • OSPF Overview
  • Configuring OSPF - Point-to-Point Link
  • Configuring OSPF - Ethernet Link

Controller-based WIFI Networks - WLC

  • Configuring the Wired Topology including Smart Macro
  • Configuring Routing Protocols for the Wired Topology
  • Configuring DHCP & DHCP Relay Agent for a wireless network to register the AP to the WLC
  • Registering APs to WLC - Manual Configurations
  • Initializing the WLC - CLI
  • Verifying AP registrations on the WLC
  • Configuring a Wifi Network - Controller-based Central Switched
  • Initializing the WLC with Port-Channels
  • Configuring Radio Channels Manually
  • Configuring a Wifi Network - Flex Connected Mode AP
  • Configure the WLAN as a Flex Connect WLAN

Integrating ISE and WLC

  • Integrating ISE & WLC for Authentication
  • Create Groups and Assign Users to them
  • Create an Authorization Profile to specify the VLAN to be assigned
  • Configure an Authorization Policy to link the Group to the Profile
  • Configuring WLAN using WPA+WPA2 (802.1x with ISE)
  • Recap of ISE-WLC Integration and DACL

Integrating AD with ISE

  • Add Active Directory to ISE
  • Incorporating the AD Groups into your Policy
  • Using AD with Certificate based Authentication

Guest Configurations

  • Guest Access Overview
  • Basic Guest Access - WEP
  • Basic Guest Access - Local Web Authentication
  • Anchor Configuration
  • Recap & Guest - HotSpot
  • Guest - Sponsor Portal

MAB

  • Configuring MAB for Access Points

Configuring Autonomous Access Points

Basic Configuration

  • Autonomous AP Overview
  • Configuring Autonomous AP for Endusers

Configuring Autonomous APS in Infrastructure Mode

  • Configuring AAP in a Root-Non-Root Bridge Mode
  • Client Filtering
  • Configuring AAP in a Root-Workgroup Bridge Mode - AAP - AAP
  • Configuring AAP in a Root-Workgroup Bridge Mode - WLC - AP

Configuring Mobility Express

Basic Configurations

  • Architecture Overview
  • Network Setup for ME
  • Configuring AP as ME Capable
  • Initializing the Controller - CLI

ISE Integration & WLAN Configurations

  • Integrating ISE & ME
  • Basic ME CLI Configuration
  • Authenticating ME-Users based on ISE

Software Defined Networking

Implementing SD-WAN

Introduction to SD-WAN

  • Introduction to SD-WAN
  • SD-WAN Devices & communications
  • Controller Deployment Options
  • WAN Edge Options
  • VPNs-VRFs on the SD-WAN Devices

Non-SD-WAN Component Setup

  • Configuring the WAN Component
  • Installing the Enterprise Certificate Server

Initializing the Controllers

  • Initializing vManage – CLI
  • Initializing vManage - GUI
  • Initializing vBond - CLI
  • Registering vBond in vManage
  • Initializing vSmart - CLI
  • Registering vSmart in vManage

Initializing the WAN Edges

  • WAN Edge Registration Process Overview
  • Initializing vEdges - CLI
  • Registering vEdges in vManage
  • Initializing cEdges - CLI
  • Registering cEdges in vManage

Configuring Templates

  • Templates - Overview
  • Configuring Feature Templates - System
  • Configuring Feature Templates - Banner
  • Configuring Feature Templates - VPN & VPN Interfaces for VPN 0 & VPN 512 – Branch Site(vEdges)
  • Configuring Feature Templates – External Routing - OSPF for VPN 0 – Branch Site(vEdges)
  • Configuring and Deploying Device Templates for vEdge – Branch Site(vEdges)
  • Configuring Internal Routing Protocols on the Internal Routing Devices – HQ & All Branches
  • Configuring Feature Templates – Service VPN – VPN, VPN Interface and Internal Routing – Branch Site(vEdges)
  • Implementing a Service VPN using Templates – Branch Sites
  • OMP-TLOC-Packet Flow-ECMP-Traffic Simulation
  • Configuring Feature Templates for HQ-Site(vEdge1) – VPNs, VPN Interfaces, External & Internal Routing
  • Configuring Device Templates for HQ-Site(vEdge1) to deploy VPN 0, 1 and 512.
  • Configuring Feature Templates for CSR – VPN 0 & 1, VPN Interface for VPN 0 & 1, External Routing – OSPF, & Internal Routing – OSPF
  • Configuring Device Templates for CSR to deploy VPN 0 and Service VPN 1

Configuring Centralized Policies

  • Policies Component in SD-WAN - Overview
  • Configuring and Deploying Feature and Device Templates for vSmart Controllers
  • Configuring Application Aware Policies using Telnet and Web
  • Configuring Application Aware Policies using Deep Packet Inspection (DPI)
  • Manipulating Traffic flow using TLOCs
  • Configuring Route Filtering
  • Configuring A Hub-n-Spoke Topology using a TLOC
  • Configuring Direct Internet Access (DIA)

Configuring Advanced Features like TLOC-Extensions

  • Configuring the Controllers and Routers for Topology 2
  • Site with Multiple vEdges & Multiple Transports
  • Configuring TLOC Extensions
  • Configuring vEdges thru NAT

Implementing QoS on SD-WAN

  • Overview of QoS & Localized Policies
  • Configuring Customized Components for the Localized Policy
  • Configuring the Scheduler
  • Configure & apply the Localized Policies
  • Configure the Interface parameters using Templates

Implementing SDA

Introduction to SDA

  • Introduction of Software Defined Networking
  • Introduction to the concept of Software Defined Access
  • Comparing ACI & SDA
  • Control Plane & Data Plane within the SDA Fabric
  • Communicating to Shared Services & External Networks
  • Overview of Virtual Networks - Macro-Segmentation & Inter-VN Communications
  • SDA Components & Roles
  • DNAC & ISE Integrations Overview

Configuring the Non-SDA Components

  • Configuring DNAC & ISE Integration
  • Configuring Border Switch Initial Configuration
  • Configuring Fusion Router Initial Configuration

Configuring the DNAC Design Components

  • DNAC Design - Network Hierarchy – Site & Building
  • DNAC Design – Server Configuration – AAA, NTP
  • DNAC Design - Device Credentials
  • DNAC Design - IP Address Pools

Using LAN Automation to discover the devices

  • DNAC Discovery – Discover the Seed Device (Border)
  • DNAC Provisioning - Assign Seed Device to HQ
  • Configuring the Underlay fo Manual Fabric Discovery
  • Discovering the Fabric Edge Nodes
  • Assigning the Fabric Edge Nodes to HQ Building
  • Cleanig up the Fabric Edge and Border Node in preparation for LAN Automation
  • DNAC Provisioning – Enable LAN Automation to Discover the Fabric
  • Provision the devices to HQ Site

Create & configuring the Fabric & L3Handoff

  • Reserve the IP Pools for HQ Site for Overlay & Underlay
  • Create VNs for the Fabric
  • Create the Transit Network (L3HANDOFF)
  • Configure Host Onboarding
  • Provision the Control-Border Device
  • Provision the Edge Device
  • Configure the Fusion Router to match the border configuration

Configuring ISE for SDA

  • Configure User & Groups on ISE
  • Configure Authorization Profiles for the DNAC VNs
  • Configure Authorization Policies for the DNAC VNs
  • Configure the DHCP Server to provide IP Configuration to Clients
  • Verifying Macro Segmentation

Configuring Micro Segmentation

  • Create the SGT
  • Re-configure ISE Authorization Policies to use SGTs
  • Using a default contract to block all communications between SGTs
  • Creating a SG ACL - Contract
  • Applying and verifying a Custom SG ACL- Contract