CCNP - Enterprise Core

Sections 1 & 4

IP Services

  • ZBF - FHRP - DHCP - NTP - AAA
  • SLA - NAT - OSPF

SD-WAN

  • Introduction to SD-WAN
  • SD-WAN Devices & communications
  • Controller Deployment Options
  • WAN Edge Options
  • VPNs-VRFs on the SD-WAN Devices
  • Configuring the WAN Component
  • Installing the Enterprise Certificate Server
  • Initializing vManage – CLI
  • Initializing vManage - GUI
  • Initializing vBond - CLI
  • Registering vBond in vManage
  • Initializing vSmart - CLI
  • Registering vSmart in vManage
  • WAN Edge Registration Process Overview
  • Initializing vEdges - CLI
  • Registering vEdges in vManage
  • Initializing cEdges - CLI
  • Registering cEdges in vManage
  • Templates - Overview
  • Configuring Feature Templates - System
  • Configuring Feature Templates - Banner
  • Configuring Feature Templates - VPN & VPN Interfaces for VPN 0 & VPN 512 – Branch Site(vEdges)
  • Configuring Feature Templates – External Routing - OSPF for VPN 0 – Branch Site(vEdges)
  • Configuring and Deploying Device Templates for vEdge – Branch Site(vEdges)
  • Configuring Internal Routing Protocols on the Internal Routing Devices – HQ & All Branches
  • Configuring Feature Templates – Service VPN – VPN, VPN Interface and Internal Routing – Branch Site(vEdges)
  • Implementing a Service VPN using Templates – Branch Sites
  • OMP-TLOC-Packet Flow-ECMP-Traffic Simulation
  • Configuring Feature Templates for HQ-Site(vEdge1) – VPNs, VPN Interfaces, External & Internal Routing
  • Configuring Device Templates for HQ-Site(vEdge1) to deploy VPN 0, 1 and 512.
  • Configuring Feature Templates for CSR – VPN 0 & 1, VPN Interface for VPN 0 & 1, External Routing – OSPF, & Internal Routing – OSPF
  • Configuring Device Templates for CSR to deploy VPN 0 and Service VPN 1
  • Policies Component in SD-WAN - Overview
  • Configuring and Deploying Feature and Device Templates for vSmart Controllers
  • Configuring Application Aware Policies using Telnet and Web
  • Configuring Application Aware Policies using Deep Packet Inspection (DPI)
  • Manipulating Traffic flow using TLOCs
  • Configuring Route Filtering
  • Configuring A Hub-n-Spoke Topology using a TLOC
  • Configuring Direct Internet Access (DIA)
  • Configuring the Controllers and Routers for Topology 2
  • Site with Multiple vEdges & Multiple Transports
  • Configuring TLOC Extensions
  • Configuring vEdges thru NAT
  • Overview of QoS & Localized Policies
  • Configuring Customized Components for the Localized Policy
  • Configuring the Scheduler
  • Configure & apply the Localized Policies
  • Configure the Interface parameters using Templates

SDA

  • Introduction of Software Defined Networking
  • Introduction to the concept of Software Defined Access
  • Comparing ACI & SDA
  • Control Plane & Data Plane within the SDA Fabric
  • Communicating to Shared Services & External Networks
  • Overview of Virtual Networks - Macro-Segmentation & Inter-VN Communications
  • SDA Components & Roles
  • DNAC & ISE Integrations Overview
  • Configuring DNAC & ISE Integration
  • Configuring Border Switch Initial Configuration
  • Configuring Fusion Router Initial Configuration
  • DNAC Design - Network Hierarchy – Site & Building
  • DNAC Design – Server Configuration – AAA, NTP
  • DNAC Design - Device Credentials
  • DNAC Design - IP Address Pools
  • DNAC Discovery – Discover the Seed Device (Border)
  • DNAC Provisioning - Assign Seed Device to HQ
  • Configuring the Underlay fo Manual Fabric Discovery
  • Discovering the Fabric Edge Nodes
  • Assigning the Fabric Edge Nodes to HQ Building
  • Cleanig up the Fabric Edge and Border Node in preparation for LAN Automation
  • DNAC Provisioning – Enable LAN Automation to Discover the Fabric
  • Provision the devices to HQ Site
  • Reserve the IP Pools for HQ Site for Overlay & Underlay
  • Create VNs for the Fabric
  • Create the Transit Network (L3HANDOFF)
  • Configure Host Onboarding
  • Provision the Control-Border Device
  • Provision the Edge Device
  • Configure the Fusion Router to match the border configuration
  • Configure User & Groups on ISE
  • Configure Authorization Profiles for the DNAC VNs
  • Configure Authorization Policies for the DNAC VNs
  • Configure the DHCP Server to provide IP Configuration to Clients
  • Verifying Macro Segmentation
  • Create the SGT
  • Re-configure ISE Authorization Policies to use SGTs
  • Using a default contract to block all communications between SGTs
  • Creating a SG ACL - Contract
  • Applying and verifying a Custom SG ACL- Contract

Multicasting

  • Multicasting

QOS

  • QOS

Intra-AS MPLS VPNs

  • Overview of Packet Switching Technologies
  • Overview of Label Forwarding
  • Configuring Unicast Routing on the Core Routers
  • Configuring a BGP-Free Core with MPLS Unicast Routing
  • MPLS VPN Overview
  • Configuring the VRF on the PE Router - CUST-A
  • Running RIPv2 as the PE-CE Routing Protocol
  • Running OSPF as the PE-CE Routing Protocol
  • Configuring MP-BGP on the PE Routers to configure Intra-AS MPLS VPN - CUST-A
  • MPLS Route Propagation Flow for Verification & Troubleshooting
  • Configuring EIGRP as the PE-CE Routing Protocol
  • Configuring Static & Default Route between PE-CE
  • Configuring BGP as the PE-CE Protocol
  • Configuring BGP as the PE-CE Protocol - AS-Override & Allowas-In
  • Understanding the Traffic Flow thru MPLS VPN
  • Overview of MPLS VPN Extranets
  • Configuring MPLS VPN Extranets Using Export-Maps
  • Configuring OSPF - SuperBackone
  • Configuring OSPF - Domain-ID
  • Configuring OSPF - Shamlink
  • Configuring an Intra-AS MPLS-VPN using a VPNv4 Route Reflector

Section 2

Securing Networks Using VPNs

  • VPNs - IPSec - GRE - SVTI - mGRE - DMVPN
  • VRF - Aware VPNs - IKEv2 - CA Server

Data Center Technologies (NEXUS)

  • Creating VDC
  • Initial VDC Setup
  • Management Interface
  • Nexus Features
  • Aliases & Saving VDC Configs
  • Interface Identifications
  • Checkpoint & Rollback Commands
  • Trunking & VLANs
  • Creating SVIs
  • Configuring a Port-Channel - Static
  • Configuring a Port-Channel - LACP
  • Configuring IP ACLs
  • Remote Management
  • Configuing Rapid-PVSTP
  • Rapid-PVTP Optimizations
  • Configuring MST
  • Configuring the L3 Topology
  • Configuring Static Routes
  • Configuring EIGRP
  • Configuring OSPF
  • vPC Overview
  • Configuring a vPC
  • Overview of FHRP
  • Configuring HSRP
  • Configuring VRRP
  • vPC Peer-Gateway
  • Overview of FEX
  • Configuring FEX with Port-Channels
  • Configuring FEX with vPCs
  • Overview of VXLAN
  • Configuring VXLAN - Base configuration
  • Configuring VXLAN - L2VNI
  • Configuring VXLAN - L3VNI
  • Overview of OTV
  • Configuring OTV - Unicast-based
  • Configuring OTV - Multicast-based
  • Overview of FabricPath
  • Configuring FabricPath
  • Configure FabricPath with vPC (vPC+)

Section 3

Switching

  • L2 Ethernet Technologies

Routing Using OSPF

  • OSPF Overview
  • OSPF - Network Statement
  • OSPF - Passive Interface
  • OSPF Calculating Metric
  • OSPF on a Multi-Access Segment
  • OSPF on a Serial Link
  • OSPF on a Loopback Interface
  • OSPF - Unicast Neighbors
  • OSPF LSA Type 1 - Router LSA
  • OSPF LSA Type 2 - Network LSA
  • OSPF LSA Type 3 - Summary LSA
  • OSPF LSA Type 5 - External LSA
  • OSPF LSA Type 4 - ASBR Summary LSA
  • LSA's Recap
  • Configuring a Multi-Area - Multi-Domain Network
  • Configuring LSA Type 3 Filtering
  • Configuring Manual Inter-Area Route Summarization
  • Configuring Manual External Route Summarization
  • Configuring Clear Text Authentication
  • Configuring MD5-based Authentication
  • Configuring a Stub Area
  • Configuring a Totally Stubby Area
  • Configuring a Not-So-Stubby-Area (NSSA)
  • Configuring a NSSA - Stub Area
  • Configuring a NSSA - Totally Stubby Area
  • Configuring the Multi-Domain Topology for Redistribution
  • Redistributing EIGRP & OSPF
  • Redistributing Static Routes
  • Redistrubuting Connected
  • Redistributing with Route-Filtering
  • Redistributing with Route-Tagging
  • Single-Tier Virtual Link
  • Multi-Tier Virutal Link
  • Configuring BFD with OSPF
  • Configuring IP FRR with OSPF

Routing Using BGP

  • BGP Overview
  • Configuring Basic eBGP
  • Injecting Routes into BGP using Network Statements
  • Injecting Routes into BGP using Redistribution - Connected
  • Configuring IGP Redistribution into BGP
  • BGP Authentication using MD5
  • BGP Multi-Hop
  • Configuring Underlay Routig Protocol for iBGP
  • Configuring iBGP using Loopbacks
  • Configuring iBGP with Next-Hop-Self
  • Configuring Route-reflectors - Basic
  • Configuring Peer-Groups
  • Access-lists & Prefix-Lists
  • Configuring Route-Filtering in BGP - ACL
  • Configuring Route-Filtering in BGP - Prefix-List
  • Configuring Route-Filtering in BGP - AS Path Filter
  • Configuring Route Aggregation with Filtering
  • Configuring Route Aggregation with Summary-Only
  • Configuring Route Aggregation with Suppress-Maps
  • Configuring Route-Aggregation with Unsuppress Maps
  • BGP Attributes-Overview
  • BGP Attributes-Local Preference
  • BGP Attributes-MED
  • BGP Attributes-Weight
  • BGP Attributes-AS-Path
  • BGP Attributes-Standard Community - No-Advertise
  • BGP Attributes-Standard Community - No-Export
  • BGP Advanced-Conditional Advertisement
  • BGP Advanced-Multipaths
  • BGP Advanced-Redistribute Internal
  • BGP Advanced-RR with Next-hop-self
  • BGP Advanced-BFD
  • BGP Advanced-Advanced RR
  • BGP Advanced-Dynamic BGP Neighbors
  • BGP Advanced-Private-AS
  • BGP Advanced-Local-AS
  • BGP Advanced-Confederations

Routing Using EIGRP (Includes Configuring ACLs)

  • EIGRP Overview
  • EIGRP - Network Statement
  • EIGRP - Passive Interfaces
  • EIGRP - Unicast Neighbors
  • EIGRP - Metric Calculations
  • Equal & Unequal Cost Load Balancing
  • Route Summarization - Auto Summary
  • Route Summarization - Manual
  • Route Summarization - Leak Maps
  • Access-lists & Prefix-Lists
  • Route Filtering Using ACLs
  • Route Filtering Using Prefix-Lists
  • Authentication EIGRP Neighbors using MD5
  • Configuring a Basic Named-Mode Configuration
  • Configuring Authentication - SHA
  • Interoperating Named-Mode and Classic-Mode
  • Configuring Authentication - MD5
  • Configuring a Multi-Domain Network
  • Redistrubuting Connected & Static Routes
  • Redistributing between RIPv2 & EIGRP
  • Redistributing between 2 different EIGRP Autonomous-Systems
  • Redistributing between OSPF & EIGRP
  • Redistribution with Route-Filtering
  • Redistribution with Route-Tagging
  • Multi-Point Mutual Redistribution of EIGRP & OSPF
  • Configuring BFD for EIGRP

Section 5

Device Administration Using TACACS+ - ISE (Includes Introduction to ISE)

  • Device Administration Overview
  • Configuring Network Devices in NDGs using TACACS+ & RADIUS
  • Authentication Overview
  • Authorization Overview
  • Accounting Overview
  • Using TACACS+ for Authentication, Authorization & Accounting for Routers - Routers
  • Using TACACS+ for Authentication, Authorization & Accounting for Routers - ISE
  • Using TACACS+ for Authentication, Authorization & Accounting for Routers - Verification
  • Using TACACS+ for Authentication, Authorization & Accounting for Switches - Switches
  • Using TACACS+ for Authentication, Authorization & Accounting for Switches - ISE
  • Using TACACS+ for Authentication, Authorization & Accounting for Switches - Verifications
  • Using TACACS+ for Authentication, Authorization & Accounting for WLC - WLC
  • Using TACACS+ for Authentication, Authorization & Accounting for WLC - ISE
  • Using TACACS+ for Authentication, Authorization & Accounting for WLC - Verification
  • Using TACACS+ for Authentication, Authorization & Accounting for ASA - ISE
  • Using TACACS+ for Authentication, Authorization & Accounting for ASA - ASA
  • Using TACACS+ for Authentication, Authorization & Accounting for ASA - Verification
  • Using RADIUS for Authentication & Accounting for Routers - Routers
  • Using RADIUS for Authentication & Accounting for Routers - ISE
  • Using RADIUS for Authentication & Accounting for Routers - Verification
  • Using RADIUS for Authentication & Accounting for Switches - Switches
  • Using RADIUS for Authentication & Accounting for Switches - ISE
  • Using RADIUS for Authentication & Accounting for Switches - Verification
  • Using RADIUS for Authentication & Accounting for WLC - WLC
  • Using RADIUS for Authentication & Accounting for WLC - ISE
  • Using RADIUS for Authentication & Accounting for WLC - Verification

Wireless Technologies

  • VLANs & Port Types
  • VTP
  • VLAN, VTP & Port Types Lab
  • Spanning-Tree Protocol (STP)
  • Physical - To - Logical Mapping - Intro
  • HSRP
  • DHCP Services
  • Configuring a Router as a DHCP Server
  • Configure a Router as a DHCP Relay Agent
  • Network Time Protocol (NTP)
  • Network Time Protocol Lab
  • Configuring Static Routes
  • Configuring Default Routes
  • EIGRP Overview
  • Configuring Basic EIGRP
  • OSPF Overview
  • Configuring OSPF - Point-to-Point Link
  • Configuring OSPF - Ethernet Link
  • Configuring the Wired Topology including Smart Macro
  • Configuring Routing Protocols for the Wired Topology
  • Configuring DHCP & DHCP Relay Agent for a wireless network to register the AP to the WLC
  • Registering APs to WLC - Manual Configurations
  • Initializing the WLC - CLI
  • Verifying AP registrations on the WLC
  • Configuring a Wifi Network - Controller-based Central Switched
  • Initializing the WLC with Port-Channels
  • Configuring Radio Channels Manually
  • Configuring a Wifi Network - Flex Connected Mode AP
  • Configure the WLAN as a Flex Connect WLAN
  • Integrating ISE & WLC for Authentication
  • Create Groups and Assign Users to them
  • Create an Authorization Profile to specify the VLAN to be assigned
  • Configure an Authorization Policy to link the Group to the Profile
  • Configuring WLAN using WPA+WPA2 (802.1x with ISE)
  • Recap of ISE-WLC Integration and DACL
  • Add Active Directory to ISE
  • Incorporating the AD Groups into your Policy
  • Using AD with Certificate based Authentication
  • Guest Access Overview
  • Basic Guest Access - WEP
  • Basic Guest Access - Local Web Authentication
  • Anchor Configuration
  • Recap & Guest - HotSpot
  • Guest - Sponsor Portal
  • Configuring MAB for Access Points
  • Autonomous AP Overview
  • Configuring Autonomous AP for Endusers
  • Configuring AAP in a Root-Non-Root Bridge Mode
  • Client Filtering
  • Configuring AAP in a Root-Workgroup Bridge Mode - AAP - AAP
  • Configuring AAP in a Root-Workgroup Bridge Mode - WLC - AP
  • Architecture Overview
  • Network Setup for ME
  • Configuring AP as ME Capable
  • Initializing the Controller - CLI
  • Integrating ISE & ME
  • Basic ME CLI Configuration
  • Authenticating ME-Users based on ISE

Introduction to FTD

  • Overview of FTD - Video
  • Initializing the FMC - CLI
  • Initializing the FMC - GUI
  • Initializing the FTD - CLI
  • Integrating FTD with FMC
  • Basic Intialization of FTD Interfaces