Video Library
Introduction-Associate
IPv4 Addressing & Subnetting
Introduction to Networking
- Introduction to Networks
- Network Types
- The Internet & DNS
Introduction to IPv4 Addressing
- IPv4 Addressing
- IPv4 Address Classes
- Private IPv4 Addressing
IPv4 Subnetting and Supernetting
- IPv4 Subnetting
- Subnetting - Class C Examples
- Subnettting - Class B Examples
- Subnetting - Class A Examples
- IPv4 Supernetting
- IPv4 Supernetting - Examples
IPv4 Variable Length Subnet Masks (VLSM)
- VLSM
- VLSM - Class C Example
- VLSM - Class B Example
- VLSM - Class A Example
IPv6 Addressing & Subnetting
Introduction to Networking
- Introduction to Networks
- Network Types
- The Internet & DNS
Introduction to IPv6 Addressing
- IPv6 Addressing
- IPv6 Address Types
- IPv6 Subnetting
CCNA
Overview of Networking
- Network Types
- The Internet & DNS
IP Addresssing [Classes, Private Addressing, Subnetting]
- IP Addressing
- IP Address Classes
- Private IP Addressing
- Subnetting
- Class C Subnetting Examples
- Class B Subnettting Examples
- Class A Subnetting Examples
- Supernetting
- Supernetting Examples
Reference Models [OSI and IP Model] & TCP UDP Protocols
- Reference Models
Initializing a Cisco Router
- Router Components
- Basic Router Configuration
- Initial Configuration
- Configuring Terminal history
- Configuring a Router Banner
- Working with the Configuration Files
- Securing the Router Console Access
- Configuring Alias
WAN Connections [PPP, Authentication, MLPP]
- Serial Interface Protocols
- Configuring and Verifying Point-to-point HDLC Connections
- Configuring and Verifying Point-to-point PPP Connections
- Configuring PPP Authentication using PAP
- Configuring PPP Authentication using CHAP
- Configuring PPP Multilink
Remote Management [Telnet SSH]
- Remote Management
- Configuring Telnet using a Password
- Configuring Telnet using an Username and Password
- Configuring SSH using an Username and Password
IP Routing
- Routing Basics
- Distance Vector Routing Protocol
- Link State Routing Protocol
- Configuring Static Routes
- Configuring Default Routes
- Configuring Floating Static
- RIP v2 Overview
- Configuring Basic RIP v2
- RIP v2 - Passive Interfaces
- RIP v2 - Auto-Summarization
- EIGRP Overview
- Configuring Basic EIGRP
- EIGRP - Passive Interfaces
- EIGRP - Auto-Summarization
- Calculating EIGRP Metrics
- EIGRP - Load Balancing
- OSPF Overview
- Configuring OSPF in a Single Area on a Point - To - Point Link
- Configuring OSPF in a Single Area on a Ethernet Link
- OSPF - Calculating Metrics
- OSPF Multi-Area Overview
- Configuring OSPF is a Multi-Area Network
- BGP Overview
- Configuring eBGP
IPv6 Addressing
- Configuring IPv6 Static Routes
- Configuring IPv6 Default Routes
- Configuring Basic RIPng
- Configuring EIGRP for IPv6
- Configuring OSPFv3
LAN Switching
- Switching Overview
- VLANs & Port Types
- VLAN Trunking Protocol (VTP)
- VLAN, VTP & Port Types Lab
- Inter-VLAN Routing
- Physical - To - Logical Mapping
- Spanning-Tree Protocol (STP)
- STP Root Switch
- STP PortFast
- STP BPDU Guard
- STP BPDU Guard Lab
- EtherChannels - Port Channels
- EtherChannel - Static Mode
- EtherChannel - LACP
- Port Security
- Port Security - Lab
Infrastructure IP Services [DNS, DHCP Server, NTP]
- FHRP Services
- HSRP
- VRRP
- DHCP Services
- Configuring a Router as a DHCP Server
- Configure a Router as a DHCP Relay Agent
- Configuring a Router as a HTTP-HTTPS Server
- Configuring a Router as a DNS Server
- Network Address Translation (NAT)
- Dynamic NAT
- Static NAT
- Dynamic PAT
- Static PAT
- Network Time Protocol (NTP)
- Network Time Protocol Lab
- CDP - LLDP
Quality of Service (QoS)
- Quality of Service (QoS)
- Qos - Policing
- Qos - Bandwidth Reservation & Prioritization
Router Maintenance
- Backing up configuration to a TFTP Server
- Restoring configuration from a TFTP Server
Security Fundamentals
- Access Control Lists Overview
- Standard Numbered ACL
- Standard Named ACL
- Extended Numbered ACL
- Extended Named ACL
- Time-based ACL
- IPv6 Access List
Routing - IPv4
IPv4 - OSPF
Basic OSPF Configuration
- OSPF Overview
- OSPF - Network Statement
- OSPF - Passive Interface
- OSPF Calculating Metric
- OSPF on a Multi-Access Segment
- OSPF on a Serial Link
- OSPF on a Loopback Interface
- OSPF - Unicast Neighbors
OSPF LSAs
- OSPF LSA Type 1 - Router LSA
- OSPF LSA Type 2 - Network LSA
- OSPF LSA Type 3 - Summary LSA
- OSPF LSA Type 5 - External LSA
- OSPF LSA Type 4 - ASBR Summary LSA
- LSA's Recap
OSPF Multi-Area & Multi-Domain Functionalities
- Configuring a Multi-Area - Multi-Domain Network
- Configuring LSA Type 3 Filtering
- Configuring Manual Inter-Area Route Summarization
- Configuring Manual External Route Summarization
- Configuring Clear Text Authentication
- Configuring MD5-based Authentication
OSPF Area Types
- Configuring a Stub Area
- Configuring a Totally Stubby Area
- Configuring a Not-So-Stubby-Area (NSSA)
- Configuring a NSSA - Stub Area
- Configuring a NSSA - Totally Stubby Area
Redistribution in OSPF
- Configuring the Multi-Domain Topology for Redistribution
- Redistributing EIGRP & OSPF
- Redistributing Static Routes
- Redistrubuting Connected
- Redistributing with Route-Filtering
- Redistributing with Route-Tagging
OSPF Advanced
- Single-Tier Virtual Link
- Multi-Tier Virutal Link
- Configuring BFD with OSPF
- Configuring IP FRR with OSPF
IPv4 - BGP
Basic eBGP Configuration
- BGP Overview
- Configuring Basic eBGP
- Injecting Routes into BGP using Network Statements
- Injecting Routes into BGP using Redistribution - Connected
- Configuring IGP Redistribution into BGP
- BGP Authentication using MD5
- BGP Multi-Hop
iBGP Configuration
- Configuring Underlay Routig Protocol for iBGP
- Configuring iBGP using Loopbacks
- Configuring iBGP with Next-Hop-Self
- Configuring Route-reflectors - Basic
- Configuring Peer-Groups
Filtering & Summarization
- Access-lists & Prefix-Lists
- Configuring Route-Filtering in BGP - ACL
- Configuring Route-Filtering in BGP - Prefix-List
- Configuring Route-Filtering in BGP - AS Path Filter
- Configuring Route Aggregation with Filtering
- Configuring Route Aggregation with Summary-Only
- Configuring Route Aggregation with Suppress-Maps
- Configuring Route-Aggregation with Unsuppress Maps
BGP Attributes
- BGP Attributes-Overview
- BGP Attributes-Local Preference
- BGP Attributes-MED
- BGP Attributes-Weight
- BGP Attributes-AS-Path
- BGP Attributes-Standard Community - No-Advertise
- BGP Attributes-Standard Community - No-Export
BGP Advanced
- BGP Advanced-Conditional Advertisement
- BGP Advanced-Multipaths
- BGP Advanced-Redistribute Internal
- BGP Advanced-RR with Next-hop-self
- BGP Advanced-BFD
- BGP Advanced-Advanced RR
- BGP Advanced-Dynamic BGP Neighbors
- BGP Advanced-Private-AS
- BGP Advanced-Local-AS
- BGP Advanced-Confederations
IPv4 - EIGRP
Basic EIGRP Configuration
- EIGRP Overview
- EIGRP - Network Statement
- EIGRP - Passive Interfaces
- EIGRP - Unicast Neighbors
- EIGRP - Metric Calculations
Optimizing EIGRP
- Equal & Unequal Cost Load Balancing
- Route Summarization - Auto Summary
- Route Summarization - Manual
- Route Summarization - Leak Maps
Securing EIGRP
- Access-lists & Prefix-Lists
- Route Filtering Using ACLs
- Route Filtering Using Prefix-Lists
- Authentication EIGRP Neighbors using MD5
Named-Mode EIGRP
- Configuring a Basic Named-Mode Configuration
- Configuring Authentication - SHA
- Interoperating Named-Mode and Classic-Mode
- Configuring Authentication - MD5
Redistribution with EIGRP
- Configuring a Multi-Domain Network
- Redistrubuting Connected & Static Routes
- Redistributing between RIPv2 & EIGRP
- Redistributing between 2 different EIGRP Autonomous-Systems
- Redistributing between OSPF & EIGRP
- Redistribution with Route-Filtering
- Redistribution with Route-Tagging
- Multi-Point Mutual Redistribution of EIGRP & OSPF
Additional Labs
- Configuring BFD for EIGRP
IPv4 - ISIS
Basic IS-IS Configuration
- Overview of IS-IS
- Configuring IS-IS - Single Area
- Configuring DIS on an IS-IS Segment
- Configuring Single Area IS-IS - Level-1 Only
- Configuring Single Area IS-IS - Level-2 Only
- Configuring IS-IS Metrics
- Configuring IS-IS Metric-Style
IS-IS Multi-Area
- Configuring a Multi-Area IS-IS Network
- Understanding Level-1 Routers in a Multi-Area Setup
- Redistributing Level-2 Routes towards Level-1 Routers
- Configuring Manual Inter-Area Route Summarization
- Configuring Clear Text Authentication
- Configuring MD5-based Authentication
- Configuring BFD for IS-IS
IS-IS Multi-Domain Functionalities
- Configuring a Multi-Domain Topology with IS-IS
- Redistributing Connected & Static Routes
- Redistributing OSPF & IS-IS
- Redistributing EIGRP & IS-IS
- Configuring Manual External Route Summarization
- Redistributing with Route-Filtering
- Redistributing with Route-Tagging
Security Technologies
Implementing a Cisco ASA 9.x Firewall
Overview and Basic Initialization
- ASA Overview and Traffic Flow
- Basic Initialization
Configuring Routing on the ASA
- Routing on the ASA - Static Routes
- Routing on the ASA - RIPv2
- Routing on the ASA - EIGRP
- Routing on the ASA - OSPF
- Routing on the ASA - BGP
Traffic Flow
- Controlling Thru Traffic Using an Access Control Lists (ACL)
- Controlling Traffic to the Firewall
Remote Management
- Remote Management Access to the Firewall
- Configuring Management Access Using TELNET
- Configuring Management Access Using SSH
- Configuring Management Access Using HTTP using ASDM
Network Address Transalation (NAT)
- Overview of NAT and Dynamic NAT
- Static NAT
- Destination NAT
- Dynamic PAT
- Static PAT
- Policy NAT
Transparent Layer 2 Firewall
- Overview and Basic Initialization of Transparent Firewall
- Routing Thru a Transparent Firewall
- Ethertype ACLs on a Transparent Firewall
Virtualization and Redundancy
- Redundant Interfaces
- Port-Channels
- Security Contexts
- Active Standby Failover - Stateless
- Active Standby Failover - Stateful
- Active Active Failover
- ASA Clustering Overview
- ASA Clustering - Spanned Mode
Deep Packet Inspection (DPI)
- Deep Packet Inspection Overview
- DPI - ICMP Inspection
- DPI - FTP on a Non-Standard Port
Virtual Private Networks (VPNs)
- IPSec Overview
- Site-To-Site IPSec thru a Firewall - without NAT-T
- Site-To-Site IPSec thru a Firewall - with NAT-T
- LAN-To-LAN VPN between a Router and an ASA
- Configuring ASDM for Management
- Configuring WebVPN
- Remote Access VPN using AnyConnect
Virtual Private Networks (VPNs)
Basic VPNs
- VPN Overview
- LAN-To-LAN Tunnel without NAT-T
- LAN-To-LAN Tunnel with NAT-T
- Point-to-Point GRE
- Encrypting GRE Tunnels using IPSec
- IPSec Tunnel Interface - Static Virtual Tunnel Interface
Advanced VPNs
- Multipoint GRE (mGRE) Tunnel
- Configuring DMVPN – Phase I
- Configuring DMVPN – Phase II
- Configuring DMVPN – Phase III
- Configuring DMVPN Phase III with Dual Hub
- Encrypting DMVPN Traffic using IPSec
- Configuring GETVPN-small
- Configuring GETVPN with Redundancy
- Configuring VRF aware VPN
- Configuring a Router as a CA Server
Configuring VPNs using IKEV2
- Site-To-Site IPSec VPN using IKEv2 – Crypto Maps
- Site-To-Site IPSec VPN using IKEv2 – S-VTI
Configuring FLEX VPNs
- Site-To-Site IPSec VPN using IKEv2 – Crypto Maps
- Site-To-Site IPSec VPN using IKEv2 – S-VTI
ASA VPNs
- Site-To-Site IPSec thru a Firewall - without NAT-T
- Site-To-Site IPSec thru a Firewall - with NAT-T
- LAN - To -LAN VPN between a Router and an ASA
- Configuring ASDM for Management
- Configuring WebVPN
- Remote Access VPN using AnyConnect
Firepower Threat Defense (FTD)
Overview of FTD & Basic Configuration
- Overview of FTD - Video
- Initializing the FMC - CLI
- Initializing the FMC - GUI
- Initializing the FTD - CLI
- Integrating FTD with FMC
- Basic Intialization of FTD Interfaces
Routing on the FTD
- Routing Configuration - Static Routing
- Routing Configuration - OSPF
- Redsitributing Static Routes into OSPF
- Routing Configuration - RIPv2 with Redistribution
- Routing Configuration - BGP
- Verifying Routing on the Routers
- Allowing traffic thru the FTD using a Basic Access Control Policy
- Review of Basic Setup & EIGRP Flex Config
Network Address Translation (NAT)
- Overview of NAT
- Dynamic NAT
- Static NAT
- Dynamic PAT
- Static PAT
- Policy NAT- Manual NAT
- ACP Using L3-L4 Characteristics
- Verifying NAT & ACP
Access Control Policy (ACP) - Advanced
- Geo Location based Blocking
- URL Filtering
- Access Control Policy Analysis
- Application Visibility Control (AVC) Control
- Logging & Alerting
- Intrusion Prevention Overview
- Intrusion Prevention Policies - Default Policies
- Intrusion Prevention Policies - Custom Policies
- Network AMP-File Policies
- Packet flow thru the FTD
- Creating the Pre-Filter
Redundancy & Multi-Instance
- Redundancy & Multi-Context Overview
- Configuring Active-Standby Failover
- Multi-Instance Overview
- Verifying Active-Standby Failover
Transparent Firewalls
- Configuring a Transparent Firewall Overview
- Configuring Transparent Firewall - CLI
- Configuring Transparent Firewall - GUI
- Configuring the Access Policy
ISE
Overview and Initialization of ISE
- Overview of ISE
- Configuring the base network for Wired ISE
- ISE Common CLI Configurations
- ISE Initial Configuration in GUI
Integrating ISE and Switch for 801.1X Authentication
- Configure the relationship between ISE & Switch
- Create Groups and Assign Users to them
- Create an Authorization Profile to specify the VLAN to be assigned
- Configure an Authorization Policy to link the Group to the Profile
- Configuring the Switch for Dot1x Authentication use the ISE Configuration Validator Tool
- Configuring the SVIs and DHCP Pools on SW2
- Configuring the Clients for Dot1x Authentication and Verifying the VLAN Assignments
- Downloadable ACLs (DACLs)
Configuring ISE for a Wireless Network
- Configuring the Wired Topology including Smart Macro
- Configuring Routing Protocols for the Wired Topology
- Configuring DHCP & DHCP Relay Agent for a wireless network to register the AP to the WLC
- Registering APs to WLC - Manual Configurations
- Initializing the WLC - CLI
- Verifying AP registrations on the WLC
- Configuring a Wifi Network - Controller-based Central Switched
Integration ISE & WLC
- Integrating ISE & WLC for Authentication
- Create Groups and Assign Users to them
- Create an Authorization Profile to specify the VLAN to be assigned
- Configure an Authorization Policy to link the Group to the Profile
- Configuring WLAN using WPA+WPA2 (802.1x with ISE)
- Recap of ISE-WLC Integration and DACL
Integrating Active Directory & ISE
- Add Active Directory to ISE
- Incorporating the AD Groups into your Policy
- Using AD with Certificate based Authentication
Configuring MAB
- Configuring MAB for Access Points
Device Administration using ISE
Overview and Initialization of ISE
- Device Administration Overview
- Configuring Network Devices in NDGs using TACACS+ & RADIUS
Overview of AAA
- Authentication Overview
- Authorization Overview
- Accounting Overview
Configuring Device Administration using TACACS+
- Using TACACS+ for Authentication, Authorization & Accounting for Routers - Routers
- Using TACACS+ for Authentication, Authorization & Accounting for Routers - ISE
- Using TACACS+ for Authentication, Authorization & Accounting for Routers - Verification
- Using TACACS+ for Authentication, Authorization & Accounting for Switches - Switches
- Using TACACS+ for Authentication, Authorization & Accounting for Switches - ISE
- Using TACACS+ for Authentication, Authorization & Accounting for Switches - Verifications
- Using TACACS+ for Authentication, Authorization & Accounting for WLC - WLC
- Using TACACS+ for Authentication, Authorization & Accounting for WLC - ISE
- Using TACACS+ for Authentication, Authorization & Accounting for WLC - Verification
- Using TACACS+ for Authentication, Authorization & Accounting for ASA - ISE
- Using TACACS+ for Authentication, Authorization & Accounting for ASA - ASA
- Using TACACS+ for Authentication, Authorization & Accounting for ASA - Verification
Configuring Device Administration using RADIUS
- Using RADIUS for Authentication & Accounting for Routers - Routers
- Using RADIUS for Authentication & Accounting for Routers - ISE
- Using RADIUS for Authentication & Accounting for Routers - Verification
- Using RADIUS for Authentication & Accounting for Switches - Switches
- Using RADIUS for Authentication & Accounting for Switches - ISE
- Using RADIUS for Authentication & Accounting for Switches - Verification
- Using RADIUS for Authentication & Accounting for WLC - WLC
- Using RADIUS for Authentication & Accounting for WLC - ISE
- Using RADIUS for Authentication & Accounting for WLC - Verification
Web Security Appliance (WSA)
Overview and Initialization of WSA
- Overview of WSA
- Configuring the base network for WSA
- Initialization of WSA from CLI
- Initialization of WSA from GUI
Configuring Transparent Redirection
- Configure the WCCP Relationship between the WSA & Router - WSA
- Configure the WCCP Relationship between the WSA & Router - Router
- Verifying Transparent Redirection
Configuring Identities & Access Policies
- Configure Identities
- Configure Access Policies to block specific Sites for Specific Identities
Configuring Custom Categories
- Configuring Custom Categories - Whitelist
- Using Custom Categories in your Access Policies - Whitelist
- Configuring Custom Categories - Blacklist
- Using Custom Categories in your Access Policies - Blacklist
E-Mail Security Appliance (ESA)
Overview Mail and ESA
- Overview of E-Mail propagation
- Forwarding E-Mails normally without an ESA
- Overview of ESA
Initializing & Configuring the ESA Appliance
- Initialization of ESA from CLI
- Initialization of ESA from GUI
- Configuring the ESA as the Relay Host
- Re-configuring the DNS Server
- Verifying of forwarding of the E-mails thru the ESA
Configuring Custom Filters
- Configure Outgoing Content Filters
- Configure Incoming Content Filters
- Configure Incoming Mail Policy
- Configure Outgoing Mail Policy
- Verifying the use of the Mail Policy
Data Center Technologies
Configuring the Nexus Series Switches (NX-OS)
Creating and Initializing VDCs
- Creating VDC
- Initial VDC Setup
- Management Interface
- Nexus Features
- Aliases & Saving VDC Configs
- Interface Identifications
Introduction to Nexus OS
- Checkpoint & Rollback Commands
- Trunking & VLANs
- Creating SVIs
- Configuring a Port-Channel - Static
- Configuring a Port-Channel - LACP
- Configuring IP ACLs
- Remote Management
Configuring STP
- Configuing Rapid-PVSTP
- Rapid-PVTP Optimizations
- Configuring MST
Configuring Routing
- Configuring the L3 Topology
- Configuring Static Routes
- Configuring EIGRP
- Configuring OSPF
Configuring vPC
- vPC Overview
- Configuring a vPC
Configuring FHRP
- Overview of FHRP
- Configuring HSRP
- Configuring VRRP
- vPC Peer-Gateway
FEX
- Overview of FEX
- Configuring FEX with Port-Channels
- Configuring FEX with vPCs
Configuring VXLAN
- Overview of VXLAN
- Configuring VXLAN - Base configuration
- Configuring VXLAN - L2VNI
- Configuring VXLAN - L3VNI
Configuring OTV
- Overview of OTV
- Configuring OTV - Unicast-based
- Configuring OTV - Multicast-based
Configuring FabricPath
- Overview of FabricPath
- Configuring FabricPath
- Configure FabricPath with vPC (vPC+)
Implementing and Understanding Cisco ACI
ACI Technology Overview
- ACI Overview
- Understanding Spines, Leaf's & APICs
- Physical Connectivity & Bootstraping the APIC
- Fabric Discovery Process
- Understanding the Traffic Flow within ACI
Access Policies Provisioning
- Configuring Interface Policies
- Configuring Interface Policy Groups (IPG)
- Configuring Interface Profiles
- Configuring Switch Profiles
- Configuring Port-Channels & Virtual-Port Channels
- Overview of VLANs & Port Types
- Configuring VLAN Pools
- Configuring Domains
- Configuring AAEPs
Tenant Provisioning
- Tenant Overview
- Creating the Tenant
- Creating the VRF
- Creating the Bridge Domains & SVI
Application Provisioning
- Application Profile Overview
- Create the Application Profile
- Create the appropriate EPGs & Assign Ports to the EPGs
- Create the Contract,Subjects & Filters and specify the appropriate access
- Provision the Contract as either Provided or Consumed Contract
External Domains
- Access-Provisioning, Tenant Provisioning & Application Provisioning - Lab 2
- L2-OUT Overview
- Configuring External Bridge Domain - Trunks, Port Channels & vPCs
- Configuring Contracts between External Bridge domains & AC
- L3-OUT Overview
- Configuring BGP in the Fabric with Spines as RRs
- Configuring L3OUT using - EIGRP
- Configuring L3OUT using - OSPF
- Configuring Transit Routing thru the ACI Fabric
Configuring Additional Features
- Configure an External Firewall Integration
- Configure a VMM Domain Integration
Multi-Pod/Multi-Site
- Multi-Pod-Multi-Site Overview
Service Provider Technologies
Configuring L3 Intra-AS MPLS VPNs – IOS-based
MPLS Unicast Routing
- Overview of Packet Switching Technologies
- Overview of Label Forwarding
- Configuring Unicast Routing on the Core Routers
- Configuring a BGP-Free Core with MPLS Unicast Routing
Configuring Intra-AS MPLS VPNs
- MPLS VPN Overview
- Configuring the VRF on the PE Router - CUST-A
- Running RIPv2 as the PE-CE Routing Protocol
- Running OSPF as the PE-CE Routing Protocol
- Configuring MP-BGP on the PE Routers to configure Intra-AS MPLS VPN - CUST-A
- MPLS Route Propagation Flow for Verification & Troubleshooting
- Configuring EIGRP as the PE-CE Routing Protocol
- Configuring Static & Default Route between PE-CE
- Configuring BGP as the PE-CE Protocol
- Configuring BGP as the PE-CE Protocol - AS-Override & Allowas-In
- Understanding the Traffic Flow thru MPLS VPN
Configuring Advanced Features
- Overview of MPLS VPN Extranets
- Configuring MPLS VPN Extranets Using Export-Maps
- Configuring OSPF - SuperBackone
- Configuring OSPF - Domain-ID
- Configuring OSPF - Shamlink
- Configuring an Intra-AS MPLS-VPN using a VPNv4 Route Reflector
Configuring L3 Inter-AS MPLS VPNs – IOS-based
Configuring Intra-AS MPLS VPN - AS # 100
- Overview of Inter-AS MPLS VPN
- Configuring OSPF as the Core SP IGP
- Configuring MPLS Unicast Routing
- Configuring MP-iBGP with Route Reflectors
- Configure the PE-Routers with VRF & PE-CE Routing using BGP
- Configuring CE Routers
Configuring Intra-AS MPLS VPN - AS # 200
- Configuring IS-IS as the Core SP IGP
- Configuring MPLS Unicast Routing
- Configuring MP-iBGP with Route Reflectors
- Configure the PE-Routers with VRF & PE-CE Routing using BGP
- Configuring CE Routers
Configuring Inter-AS MPLS VPN Options
- Inter-AS MPLS-VPN - Option A - Back-To-Back VRF
- Configuring Inter-AS MPLS-VPN - Option A
- Inter-AS MPLS-VPN - Option B - ASBR - MP-eBGP
- Configuring Inter-AS MPLS-VPN - Option B
- Traffic flow for Option B & Review of Option B
- Inter-AS MPLS-VPN - Option C - RR - MP-eBGP
- Configuring Inter-AS MPLS-VPN - Option C
- Configuring Inter-AS MPLS-VPN - Option C with Next-Hop-Unchanged
- Inter-AS MPLS-VPN - Option D - Non-VPN Transit Provider
- Configuring Inter-AS MPLS-VPN - Option D
Configuring Carrier Supporting Carrier (CSC)
- Overview of CSC
- CSC - Carrier SP IP-Based
- CSC - Carrier SP Running MPLS-Unicast Routing
- CSC - Configuring Hierarchical MPLS VPN (H-MPLS VPN)
Configuring L3 Intra-AS MPLS VPNs – IOS-XR-based
Basic IOS-XR Configuration - AS-100
- Configuring Interfaces on IOS-XR
- Configuring OSPF on IOS-XR
- Configuring LDP on IOS-XR
- Configuring Configuring MP-BGP on IOS-XR
- Configure the PE-Routers with VRF & PE-CE Routing using BGP
- Configure CE Routers - IOS
- Configure the Route Policy for eBGP Neighbors
Basic IOS-XR Configuration - AS-200
- Configuring Interfaces on IOS-XR
- Configuring IS-IS on IOS-XR
- Configuring LDP on IOS-XR
- Configuring Configuring MP-BGP on IOS-XR
- Configure the PE-Routers with VRF & PE-CE Routing using BGP
- Configure CE Routers - IOS
Configuring Inter-AS using Option C
- Option C Overview
- Configuring Route Leaking
- Configuring eBGP between ASBRs for labeled IPv4 Routing
- Configuring the ASBR to redistribute BGP into IGP
- Configuring MP-eBGP between RR's
- Configuring PE Routers to Import Remote RTs
Segment Routing - Intro to Advanced
- Segment Routing - Technology Overview
- Configuring Intra-AS MPLS Labeling using Segment Routing - AS 100
- Configuring OSPF for Segment Routing - AS100
- Verifying Segment Routing - AS100
- Configuring Intra-AS MPLS Labeling using Segment Routing - AS 200
- Configuring IS-IS for Segment Routing - AS200
- Configuring BGP for Segment between the ASBR with Route Leaking
Configuring Inter-AS MPLS VPNs – IPv6
Configuring Intra-AS MPLS VPN - AS # 100
- Overview of MPLS VPNv6
- Configuring SP Core IGP - OSPF - AS 100
- Configuring SP Core MPLS Unicast Routing - AS 100
- Configuring MP-eBGP VPNv6 - AS 100
- Configuring the PE Routers - VRF, Interface & BGP - AS 100
- Configuring the CE Routers - Interface & BGP - AS 100
Configuring Intra-AS MPLS VPN - AS # 200
- Configuring SP Core IGP - IS-IS - AS 200
- Configuring SP Core MPLS Unicast Routing - AS 200
- Configuring MP-eBGP VPNv6 - AS 200
- Configuring the PE Routers - VRF, Interface & BGP - AS 200
- Configuring the CE Routers - Interface & BGP - AS 200
Configuring Inter-AS MPLS VPN Options
- Inter-AS MPLS VPN Overview
- Inter-AS MPLS for IPv6 - Option - A
- Inter-AS MPLS for IPv6 - Option - B
- Inter-AS MPLS for IPv6 - Option - C
- Inter-AS MPLS for IPv6 - Option - D
Configuring Inter-AS MPLS VPN Options - Dual Stack
- Configuring Intra-AS MPLS VPN VPNv4 - AS 100
- Configuring Intra-AS MPLS VPN VPNv4 - AS 200
- Configuring Inter-AS MPLS VPN VPNv4 - VPNv4 Dual Stack
Configuring L2 MPLS VPNs, MPLS TE & MPLS QoS
Configuring MPLS L2VPN using AToM
- Overview of Layer 2 VPNS
- Configuring MPLS Unicast Routing on the Core Routers
- Configuring MPLS AToM - Ethernet Physical Interfaces
- Configuring MPLS AToM - Serial HDLC
- Configuring MPLS AToM - Serial PPP
- Configuring MPLS AToM - Ethernet Sub-interfaces
- Configuring MPLS AToM - Interworking Ethernet & PPP
Configuring MPLS L2VPN using L2TPv3
- Overview of L2TPv3 and Base Setup
- Configuring L2TPv3 L2VPN
Configuring MPLS L2VPN using VPLS
- Overview of VPLS
- Configuring VPLS
Configuring MPLS Traffic Engineering
- Overview of MPLS TE
- Base Network Setup
- Configure Traffic Engineering on the Routers
- Configuring RSVP
- Configuring Static Tunnels from R1-R4
- Configuring Static Tunnels from R1-R3
- Configuring Static Tunnels from R1-R2
- Configuring Static Tunnels from R2-R4
- Configuring Static Tunnels from R2-R1
- Configuring Static Tunnels from R3-R1 with Preemption
- Configuring Dynamic Tunnels from R1-R4
- Configuring Dynamic Tunnels from R1-R3
- Configuring Dynamic Tunnels from R1-R2
- Configuring Dynamic Tunnels from R2-R1
- Configuring Dynamic Tunnels from R2-R4
- Configuring IS-IS for Traffic Engineering
- Overview of MPLS-TE with FRR
- Configuring MPLS-RE with FRR
Configuring MPLS Quality of Server (QoS)
- Overview of MPLS QoS
Configuring Inter-AS MPLS VPN Using Segment Routing
Configuring Intra-AS MPLS VPN - AS # 100
- Segment Routing - Technology Overview
- Configuring Intra-AS MPLS Labeling using Segment Routing - AS 100
- Configuring OSPF for Segment Routing - AS100
- Verifying Segment Routing - AS100
Configuring Intra-AS MPLS VPN - AS # 200
- Configuring Intra-AS MPLS Labeling using Segment Routing - AS 200
- Configuring IS-IS for Segment Routing - AS200
Configuring Inter-AS MPLS VPN Options
- Configuring BGP for Segment between the ASBR with Route Leaking
Wireless Technologies
Configuring Wireless Networks using Cisco WLC and ISE
Network Infrastructure – Layer 2
- VLANs & Port Types
- VTP
- VLAN, VTP & Port Types Lab
- Spanning-Tree Protocol (STP)
- Physical - To - Logical Mapping - Intro
Network Infrastructure – Routing
- HSRP
- DHCP Services
- Configuring a Router as a DHCP Server
- Configure a Router as a DHCP Relay Agent
- Network Time Protocol (NTP)
- Network Time Protocol Lab
- Configuring Static Routes
- Configuring Default Routes
- EIGRP Overview
- Configuring Basic EIGRP
- OSPF Overview
- Configuring OSPF - Point-to-Point Link
- Configuring OSPF - Ethernet Link
Controller-based WIFI Networks - WLC
- Configuring the Wired Topology including Smart Macro
- Configuring Routing Protocols for the Wired Topology
- Configuring DHCP & DHCP Relay Agent for a wireless network to register the AP to the WLC
- Registering APs to WLC - Manual Configurations
- Initializing the WLC - CLI
- Verifying AP registrations on the WLC
- Configuring a Wifi Network - Controller-based Central Switched
- Initializing the WLC with Port-Channels
- Configuring Radio Channels Manually
- Configuring a Wifi Network - Flex Connected Mode AP
- Configure the WLAN as a Flex Connect WLAN
Integrating ISE and WLC
- Integrating ISE & WLC for Authentication
- Create Groups and Assign Users to them
- Create an Authorization Profile to specify the VLAN to be assigned
- Configure an Authorization Policy to link the Group to the Profile
- Configuring WLAN using WPA+WPA2 (802.1x with ISE)
- Recap of ISE-WLC Integration and DACL
Integrating AD with ISE
- Add Active Directory to ISE
- Incorporating the AD Groups into your Policy
- Using AD with Certificate based Authentication
Guest Configurations
- Guest Access Overview
- Basic Guest Access - WEP
- Basic Guest Access - Local Web Authentication
- Anchor Configuration
- Recap & Guest - HotSpot
- Guest - Sponsor Portal
MAB
- Configuring MAB for Access Points
Configuring Autonomous Access Points
Basic Configuration
- Autonomous AP Overview
- Configuring Autonomous AP for Endusers
Configuring Autonomous APS in Infrastructure Mode
- Configuring AAP in a Root-Non-Root Bridge Mode
- Client Filtering
- Configuring AAP in a Root-Workgroup Bridge Mode - AAP - AAP
- Configuring AAP in a Root-Workgroup Bridge Mode - WLC - AP
Configuring Mobility Express
Basic Configurations
- Architecture Overview
- Network Setup for ME
- Configuring AP as ME Capable
- Initializing the Controller - CLI
ISE Integration & WLAN Configurations
- Integrating ISE & ME
- Basic ME CLI Configuration
- Authenticating ME-Users based on ISE
Software Defined Networking
Implementing SD-WAN
Introduction to SD-WAN
- Introduction to SD-WAN
- SD-WAN Devices & communications
- Controller Deployment Options
- WAN Edge Options
- VPNs-VRFs on the SD-WAN Devices
Non-SD-WAN Component Setup
- Configuring the WAN Component
- Installing the Enterprise Certificate Server
Initializing the Controllers
- Initializing vManage – CLI
- Initializing vManage - GUI
- Initializing vBond - CLI
- Registering vBond in vManage
- Initializing vSmart - CLI
- Registering vSmart in vManage
Initializing the WAN Edges
- WAN Edge Registration Process Overview
- Initializing vEdges - CLI
- Registering vEdges in vManage
- Initializing cEdges - CLI
- Registering cEdges in vManage
Configuring Templates
- Templates - Overview
- Configuring Feature Templates - System
- Configuring Feature Templates - Banner
- Configuring Feature Templates - VPN & VPN Interfaces for VPN 0 & VPN 512 – Branch Site(vEdges)
- Configuring Feature Templates – External Routing - OSPF for VPN 0 – Branch Site(vEdges)
- Configuring and Deploying Device Templates for vEdge – Branch Site(vEdges)
- Configuring Internal Routing Protocols on the Internal Routing Devices – HQ & All Branches
- Configuring Feature Templates – Service VPN – VPN, VPN Interface and Internal Routing – Branch Site(vEdges)
- Implementing a Service VPN using Templates – Branch Sites
- OMP-TLOC-Packet Flow-ECMP-Traffic Simulation
- Configuring Feature Templates for HQ-Site(vEdge1) – VPNs, VPN Interfaces, External & Internal Routing
- Configuring Device Templates for HQ-Site(vEdge1) to deploy VPN 0, 1 and 512.
- Configuring Feature Templates for CSR – VPN 0 & 1, VPN Interface for VPN 0 & 1, External Routing – OSPF, & Internal Routing – OSPF
- Configuring Device Templates for CSR to deploy VPN 0 and Service VPN 1
Configuring Centralized Policies
- Policies Component in SD-WAN - Overview
- Configuring and Deploying Feature and Device Templates for vSmart Controllers
- Configuring Application Aware Policies using Telnet and Web
- Configuring Application Aware Policies using Deep Packet Inspection (DPI)
- Manipulating Traffic flow using TLOCs
- Configuring Route Filtering
- Configuring A Hub-n-Spoke Topology using a TLOC
- Configuring Direct Internet Access (DIA)
Configuring Advanced Features like TLOC-Extensions
- Configuring the Controllers and Routers for Topology 2
- Site with Multiple vEdges & Multiple Transports
- Configuring TLOC Extensions
- Configuring vEdges thru NAT
Implementing QoS on SD-WAN
- Overview of QoS & Localized Policies
- Configuring Customized Components for the Localized Policy
- Configuring the Scheduler
- Configure & apply the Localized Policies
- Configure the Interface parameters using Templates
Implementing SDA
Introduction to SDA
- Introduction of Software Defined Networking
- Introduction to the concept of Software Defined Access
- Comparing ACI & SDA
- Control Plane & Data Plane within the SDA Fabric
- Communicating to Shared Services & External Networks
- Overview of Virtual Networks - Macro-Segmentation & Inter-VN Communications
- SDA Components & Roles
- DNAC & ISE Integrations Overview
Configuring the Non-SDA Components
- Configuring DNAC & ISE Integration
- Configuring Border Switch Initial Configuration
- Configuring Fusion Router Initial Configuration
Configuring the DNAC Design Components
- DNAC Design - Network Hierarchy – Site & Building
- DNAC Design – Server Configuration – AAA, NTP
- DNAC Design - Device Credentials
- DNAC Design - IP Address Pools
Using LAN Automation to discover the devices
- DNAC Discovery – Discover the Seed Device (Border)
- DNAC Provisioning - Assign Seed Device to HQ
- Configuring the Underlay fo Manual Fabric Discovery
- Discovering the Fabric Edge Nodes
- Assigning the Fabric Edge Nodes to HQ Building
- Cleanig up the Fabric Edge and Border Node in preparation for LAN Automation
- DNAC Provisioning – Enable LAN Automation to Discover the Fabric
- Provision the devices to HQ Site
Create & configuring the Fabric & L3Handoff
- Reserve the IP Pools for HQ Site for Overlay & Underlay
- Create VNs for the Fabric
- Create the Transit Network (L3HANDOFF)
- Configure Host Onboarding
- Provision the Control-Border Device
- Provision the Edge Device
- Configure the Fusion Router to match the border configuration
Configuring ISE for SDA
- Configure User & Groups on ISE
- Configure Authorization Profiles for the DNAC VNs
- Configure Authorization Policies for the DNAC VNs
- Configure the DHCP Server to provide IP Configuration to Clients
- Verifying Macro Segmentation
Configuring Micro Segmentation
- Create the SGT
- Re-configure ISE Authorization Policies to use SGTs
- Using a default contract to block all communications between SGTs
- Creating a SG ACL - Contract
- Applying and verifying a Custom SG ACL- Contract
CCNP - Enterprise Core
Sections 1 & 4
IP Services
- ZBF - FHRP - DHCP - NTP - AAA
- SLA - NAT - OSPF
SD-WAN
- Introduction to SD-WAN
- SD-WAN Devices & communications
- Controller Deployment Options
- WAN Edge Options
- VPNs-VRFs on the SD-WAN Devices
- Configuring the WAN Component
- Installing the Enterprise Certificate Server
- Initializing vManage – CLI
- Initializing vManage - GUI
- Initializing vBond - CLI
- Registering vBond in vManage
- Initializing vSmart - CLI
- Registering vSmart in vManage
- WAN Edge Registration Process Overview
- Initializing vEdges - CLI
- Registering vEdges in vManage
- Initializing cEdges - CLI
- Registering cEdges in vManage
- Templates - Overview
- Configuring Feature Templates - System
- Configuring Feature Templates - Banner
- Configuring Feature Templates - VPN & VPN Interfaces for VPN 0 & VPN 512 – Branch Site(vEdges)
- Configuring Feature Templates – External Routing - OSPF for VPN 0 – Branch Site(vEdges)
- Configuring and Deploying Device Templates for vEdge – Branch Site(vEdges)
- Configuring Internal Routing Protocols on the Internal Routing Devices – HQ & All Branches
- Configuring Feature Templates – Service VPN – VPN, VPN Interface and Internal Routing – Branch Site(vEdges)
- Implementing a Service VPN using Templates – Branch Sites
- OMP-TLOC-Packet Flow-ECMP-Traffic Simulation
- Configuring Feature Templates for HQ-Site(vEdge1) – VPNs, VPN Interfaces, External & Internal Routing
- Configuring Device Templates for HQ-Site(vEdge1) to deploy VPN 0, 1 and 512.
- Configuring Feature Templates for CSR – VPN 0 & 1, VPN Interface for VPN 0 & 1, External Routing – OSPF, & Internal Routing – OSPF
- Configuring Device Templates for CSR to deploy VPN 0 and Service VPN 1
- Policies Component in SD-WAN - Overview
- Configuring and Deploying Feature and Device Templates for vSmart Controllers
- Configuring Application Aware Policies using Telnet and Web
- Configuring Application Aware Policies using Deep Packet Inspection (DPI)
- Manipulating Traffic flow using TLOCs
- Configuring Route Filtering
- Configuring A Hub-n-Spoke Topology using a TLOC
- Configuring Direct Internet Access (DIA)
- Configuring the Controllers and Routers for Topology 2
- Site with Multiple vEdges & Multiple Transports
- Configuring TLOC Extensions
- Configuring vEdges thru NAT
- Overview of QoS & Localized Policies
- Configuring Customized Components for the Localized Policy
- Configuring the Scheduler
- Configure & apply the Localized Policies
- Configure the Interface parameters using Templates
SDA
- Introduction of Software Defined Networking
- Introduction to the concept of Software Defined Access
- Comparing ACI & SDA
- Control Plane & Data Plane within the SDA Fabric
- Communicating to Shared Services & External Networks
- Overview of Virtual Networks - Macro-Segmentation & Inter-VN Communications
- SDA Components & Roles
- DNAC & ISE Integrations Overview
- Configuring DNAC & ISE Integration
- Configuring Border Switch Initial Configuration
- Configuring Fusion Router Initial Configuration
- DNAC Design - Network Hierarchy – Site & Building
- DNAC Design – Server Configuration – AAA, NTP
- DNAC Design - Device Credentials
- DNAC Design - IP Address Pools
- DNAC Discovery – Discover the Seed Device (Border)
- DNAC Provisioning - Assign Seed Device to HQ
- Configuring the Underlay fo Manual Fabric Discovery
- Discovering the Fabric Edge Nodes
- Assigning the Fabric Edge Nodes to HQ Building
- Cleanig up the Fabric Edge and Border Node in preparation for LAN Automation
- DNAC Provisioning – Enable LAN Automation to Discover the Fabric
- Provision the devices to HQ Site
- Reserve the IP Pools for HQ Site for Overlay & Underlay
- Create VNs for the Fabric
- Create the Transit Network (L3HANDOFF)
- Configure Host Onboarding
- Provision the Control-Border Device
- Provision the Edge Device
- Configure the Fusion Router to match the border configuration
- Configure User & Groups on ISE
- Configure Authorization Profiles for the DNAC VNs
- Configure Authorization Policies for the DNAC VNs
- Configure the DHCP Server to provide IP Configuration to Clients
- Verifying Macro Segmentation
- Create the SGT
- Re-configure ISE Authorization Policies to use SGTs
- Using a default contract to block all communications between SGTs
- Creating a SG ACL - Contract
- Applying and verifying a Custom SG ACL- Contract
Multicasting
- Multicasting
QOS
- QOS
Intra-AS MPLS VPNs
- Overview of Packet Switching Technologies
- Overview of Label Forwarding
- Configuring Unicast Routing on the Core Routers
- Configuring a BGP-Free Core with MPLS Unicast Routing
- MPLS VPN Overview
- Configuring the VRF on the PE Router - CUST-A
- Running RIPv2 as the PE-CE Routing Protocol
- Running OSPF as the PE-CE Routing Protocol
- Configuring MP-BGP on the PE Routers to configure Intra-AS MPLS VPN - CUST-A
- MPLS Route Propagation Flow for Verification & Troubleshooting
- Configuring EIGRP as the PE-CE Routing Protocol
- Configuring Static & Default Route between PE-CE
- Configuring BGP as the PE-CE Protocol
- Configuring BGP as the PE-CE Protocol - AS-Override & Allowas-In
- Understanding the Traffic Flow thru MPLS VPN
- Overview of MPLS VPN Extranets
- Configuring MPLS VPN Extranets Using Export-Maps
- Configuring OSPF - SuperBackone
- Configuring OSPF - Domain-ID
- Configuring OSPF - Shamlink
- Configuring an Intra-AS MPLS-VPN using a VPNv4 Route Reflector
Section 2
Securing Networks Using VPNs
- VPNs - IPSec - GRE - SVTI - mGRE - DMVPN
- VRF - Aware VPNs - IKEv2 - CA Server
Data Center Technologies (NEXUS)
- Creating VDC
- Initial VDC Setup
- Management Interface
- Nexus Features
- Aliases & Saving VDC Configs
- Interface Identifications
- Checkpoint & Rollback Commands
- Trunking & VLANs
- Creating SVIs
- Configuring a Port-Channel - Static
- Configuring a Port-Channel - LACP
- Configuring IP ACLs
- Remote Management
- Configuing Rapid-PVSTP
- Rapid-PVTP Optimizations
- Configuring MST
- Configuring the L3 Topology
- Configuring Static Routes
- Configuring EIGRP
- Configuring OSPF
- vPC Overview
- Configuring a vPC
- Overview of FHRP
- Configuring HSRP
- Configuring VRRP
- vPC Peer-Gateway
- Overview of FEX
- Configuring FEX with Port-Channels
- Configuring FEX with vPCs
- Overview of VXLAN
- Configuring VXLAN - Base configuration
- Configuring VXLAN - L2VNI
- Configuring VXLAN - L3VNI
- Overview of OTV
- Configuring OTV - Unicast-based
- Configuring OTV - Multicast-based
- Overview of FabricPath
- Configuring FabricPath
- Configure FabricPath with vPC (vPC+)
Section 3
Switching
- L2 Ethernet Technologies
Routing Using OSPF
- OSPF Overview
- OSPF - Network Statement
- OSPF - Passive Interface
- OSPF Calculating Metric
- OSPF on a Multi-Access Segment
- OSPF on a Serial Link
- OSPF on a Loopback Interface
- OSPF - Unicast Neighbors
- OSPF LSA Type 1 - Router LSA
- OSPF LSA Type 2 - Network LSA
- OSPF LSA Type 3 - Summary LSA
- OSPF LSA Type 5 - External LSA
- OSPF LSA Type 4 - ASBR Summary LSA
- LSA's Recap
- Configuring a Multi-Area - Multi-Domain Network
- Configuring LSA Type 3 Filtering
- Configuring Manual Inter-Area Route Summarization
- Configuring Manual External Route Summarization
- Configuring Clear Text Authentication
- Configuring MD5-based Authentication
- Configuring a Stub Area
- Configuring a Totally Stubby Area
- Configuring a Not-So-Stubby-Area (NSSA)
- Configuring a NSSA - Stub Area
- Configuring a NSSA - Totally Stubby Area
- Configuring the Multi-Domain Topology for Redistribution
- Redistributing EIGRP & OSPF
- Redistributing Static Routes
- Redistrubuting Connected
- Redistributing with Route-Filtering
- Redistributing with Route-Tagging
- Single-Tier Virtual Link
- Multi-Tier Virutal Link
- Configuring BFD with OSPF
- Configuring IP FRR with OSPF
Routing Using BGP
- BGP Overview
- Configuring Basic eBGP
- Injecting Routes into BGP using Network Statements
- Injecting Routes into BGP using Redistribution - Connected
- Configuring IGP Redistribution into BGP
- BGP Authentication using MD5
- BGP Multi-Hop
- Configuring Underlay Routig Protocol for iBGP
- Configuring iBGP using Loopbacks
- Configuring iBGP with Next-Hop-Self
- Configuring Route-reflectors - Basic
- Configuring Peer-Groups
- Access-lists & Prefix-Lists
- Configuring Route-Filtering in BGP - ACL
- Configuring Route-Filtering in BGP - Prefix-List
- Configuring Route-Filtering in BGP - AS Path Filter
- Configuring Route Aggregation with Filtering
- Configuring Route Aggregation with Summary-Only
- Configuring Route Aggregation with Suppress-Maps
- Configuring Route-Aggregation with Unsuppress Maps
- BGP Attributes-Overview
- BGP Attributes-Local Preference
- BGP Attributes-MED
- BGP Attributes-Weight
- BGP Attributes-AS-Path
- BGP Attributes-Standard Community - No-Advertise
- BGP Attributes-Standard Community - No-Export
- BGP Advanced-Conditional Advertisement
- BGP Advanced-Multipaths
- BGP Advanced-Redistribute Internal
- BGP Advanced-RR with Next-hop-self
- BGP Advanced-BFD
- BGP Advanced-Advanced RR
- BGP Advanced-Dynamic BGP Neighbors
- BGP Advanced-Private-AS
- BGP Advanced-Local-AS
- BGP Advanced-Confederations
Routing Using EIGRP (Includes Configuring ACLs)
- EIGRP Overview
- EIGRP - Network Statement
- EIGRP - Passive Interfaces
- EIGRP - Unicast Neighbors
- EIGRP - Metric Calculations
- Equal & Unequal Cost Load Balancing
- Route Summarization - Auto Summary
- Route Summarization - Manual
- Route Summarization - Leak Maps
- Access-lists & Prefix-Lists
- Route Filtering Using ACLs
- Route Filtering Using Prefix-Lists
- Authentication EIGRP Neighbors using MD5
- Configuring a Basic Named-Mode Configuration
- Configuring Authentication - SHA
- Interoperating Named-Mode and Classic-Mode
- Configuring Authentication - MD5
- Configuring a Multi-Domain Network
- Redistrubuting Connected & Static Routes
- Redistributing between RIPv2 & EIGRP
- Redistributing between 2 different EIGRP Autonomous-Systems
- Redistributing between OSPF & EIGRP
- Redistribution with Route-Filtering
- Redistribution with Route-Tagging
- Multi-Point Mutual Redistribution of EIGRP & OSPF
- Configuring BFD for EIGRP
Section 5
Device Administration Using TACACS+ - ISE (Includes Introduction to ISE)
- Device Administration Overview
- Configuring Network Devices in NDGs using TACACS+ & RADIUS
- Authentication Overview
- Authorization Overview
- Accounting Overview
- Using TACACS+ for Authentication, Authorization & Accounting for Routers - Routers
- Using TACACS+ for Authentication, Authorization & Accounting for Routers - ISE
- Using TACACS+ for Authentication, Authorization & Accounting for Routers - Verification
- Using TACACS+ for Authentication, Authorization & Accounting for Switches - Switches
- Using TACACS+ for Authentication, Authorization & Accounting for Switches - ISE
- Using TACACS+ for Authentication, Authorization & Accounting for Switches - Verifications
- Using TACACS+ for Authentication, Authorization & Accounting for WLC - WLC
- Using TACACS+ for Authentication, Authorization & Accounting for WLC - ISE
- Using TACACS+ for Authentication, Authorization & Accounting for WLC - Verification
- Using TACACS+ for Authentication, Authorization & Accounting for ASA - ISE
- Using TACACS+ for Authentication, Authorization & Accounting for ASA - ASA
- Using TACACS+ for Authentication, Authorization & Accounting for ASA - Verification
- Using RADIUS for Authentication & Accounting for Routers - Routers
- Using RADIUS for Authentication & Accounting for Routers - ISE
- Using RADIUS for Authentication & Accounting for Routers - Verification
- Using RADIUS for Authentication & Accounting for Switches - Switches
- Using RADIUS for Authentication & Accounting for Switches - ISE
- Using RADIUS for Authentication & Accounting for Switches - Verification
- Using RADIUS for Authentication & Accounting for WLC - WLC
- Using RADIUS for Authentication & Accounting for WLC - ISE
- Using RADIUS for Authentication & Accounting for WLC - Verification
Wireless Technologies
- VLANs & Port Types
- VTP
- VLAN, VTP & Port Types Lab
- Spanning-Tree Protocol (STP)
- Physical - To - Logical Mapping - Intro
- HSRP
- DHCP Services
- Configuring a Router as a DHCP Server
- Configure a Router as a DHCP Relay Agent
- Network Time Protocol (NTP)
- Network Time Protocol Lab
- Configuring Static Routes
- Configuring Default Routes
- EIGRP Overview
- Configuring Basic EIGRP
- OSPF Overview
- Configuring OSPF - Point-to-Point Link
- Configuring OSPF - Ethernet Link
- Configuring the Wired Topology including Smart Macro
- Configuring Routing Protocols for the Wired Topology
- Configuring DHCP & DHCP Relay Agent for a wireless network to register the AP to the WLC
- Registering APs to WLC - Manual Configurations
- Initializing the WLC - CLI
- Verifying AP registrations on the WLC
- Configuring a Wifi Network - Controller-based Central Switched
- Initializing the WLC with Port-Channels
- Configuring Radio Channels Manually
- Configuring a Wifi Network - Flex Connected Mode AP
- Configure the WLAN as a Flex Connect WLAN
- Integrating ISE & WLC for Authentication
- Create Groups and Assign Users to them
- Create an Authorization Profile to specify the VLAN to be assigned
- Configure an Authorization Policy to link the Group to the Profile
- Configuring WLAN using WPA+WPA2 (802.1x with ISE)
- Recap of ISE-WLC Integration and DACL
- Add Active Directory to ISE
- Incorporating the AD Groups into your Policy
- Using AD with Certificate based Authentication
- Guest Access Overview
- Basic Guest Access - WEP
- Basic Guest Access - Local Web Authentication
- Anchor Configuration
- Recap & Guest - HotSpot
- Guest - Sponsor Portal
- Configuring MAB for Access Points
- Autonomous AP Overview
- Configuring Autonomous AP for Endusers
- Configuring AAP in a Root-Non-Root Bridge Mode
- Client Filtering
- Configuring AAP in a Root-Workgroup Bridge Mode - AAP - AAP
- Configuring AAP in a Root-Workgroup Bridge Mode - WLC - AP
- Architecture Overview
- Network Setup for ME
- Configuring AP as ME Capable
- Initializing the Controller - CLI
- Integrating ISE & ME
- Basic ME CLI Configuration
- Authenticating ME-Users based on ISE
Introduction to FTD
- Overview of FTD - Video
- Initializing the FMC - CLI
- Initializing the FMC - GUI
- Initializing the FTD - CLI
- Integrating FTD with FMC
- Basic Intialization of FTD Interfaces
Introduction to Network Automation Using Python
Introduction to Network Automation Using Python
Introduction to Network Automation Using Python
- Introduction to Network Automation Using Python - 1
- Introduction to Network Automation Using Python - 2