Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring EX Series switches running Junos ELS. Overview After successfully completing this course, you should be able to: List the benefits of implementing switched LANs. Describe transparent bridging concepts and operations. Describe terms and design considerations for switched LANs. List enterprise platforms that support Layer 2 switching. Configure interfaces for Layer 2 switching operations. Display and interpret the Ethernet switching table. Explain the concept of a VLAN. Describe access and trunk port modes. Configure and monitor VLANs. Describe voice VLAN and native VLAN concepts. Explain inter-VLAN routing operations. Configure and monitor inter-VLAN routing. Explain when a spanning tree is required. Describe STP and Rapid Spanning Tree Protocol (RSTP) operations. List some advantages of using RSTP over STP. Configure and monitor RSTP. Describe the bridge protocol data unit (BPDU), loop, and root protection features. Configure and monitor the BPDU, loop, and root protection features. List and describe various port security features. Configure and monitor port security features. Describe the storm control feature. Configure and monitor storm control. Describe firewall filter support for EX Series Ethernet Switches. Implement and monitor the effects of a firewall filter. List and describe some features that promote high availability. Configure and monitor high availability features. Describe the basic concepts and operational details of a virtual chassis. Implement a virtual chassis with multiple EX4300 switches. Explain the concepts of Ethernet Ring Protection Switching (ERPS). Configure and monitor ERPS. Explain the concepts of Multiple Spanning Tree Protocol (MSTP). Configure and monitor MSTP. This 4-day program includes an overview of protocol independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, switching concepts and operations, virtual LANs (VLANs), the Spanning Tree Protocol (STP), and more. Chapter 1: Course Introduction Course Introduction Chapter 2: Layer 2 Switching Ethernet Bridging Basics Terminology and Design Considerations Overview of Enterprise Switching Platforms Enabling and Monitoring Layer 2 Switching Operations Lab 1: Implementing Layer 2 Switching Chapter 3: Virtual Networks Overview of VLANs Configuring and Monitoring VLANs Voice VLAN Native VLAN Routed VLAN Interfaces Lab 2: Implementing Virtual Networks Chapter 4: Routing Instances Routing Instances Overview Configuring and Monitoring Virtual Switches Chapter 5: Spanning Tree Spanning Tree Protocol Rapid Spanning Tree Protocol Configuring and Monitoring STP and RSTP Protection Features: BPDU Protection Protection Features: Loop Protection Protection Features: Root Protection Lab 3: Implementing Spanning Tree Chapter 6: Port Security MAC Limiting Persistent MAC Learning DHCP Snooping Dynamic ARP Inspection (DAI) IP Source Guard Lab 4: Implementing Port Security Chapter 7: Device Security and Firewall Filters Storm Control Firewall Filters Lab 5: Implementing Storm Control and Firewall Filters Chapter 8: Virtual Chassis Overview of Virtual Chassis Configuring and Monitoring a Virtual Chassis Lab 6: Implementing a Virtual Chassis System Chapter 9: High Availability Features Overview of High Availability Networks Link Aggregation Groups Redundant Trunk Groups Graceful Routing Engine Switchover (GRES) Nonstop Active Routing (NSR) Nonstop Bridging (NSB) Lab 7: Implementing High Availability Features
Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview Describe the value of MPLS VPNs. Describe the differences between provider-provisioned VPNs and customer-provisioned VPNs. Describe the differences between Layer 2 VPNs and Layer 3 VPNs. List the provider-provisioned MPLS VPN features supported by the JUNOS software. Describe the roles of a CE device, PE router, and P router in a BGP Layer 3 VPN. Describe the format of the BGP routing information, including VPN-IPv4 addresses and route distinguishers. Describe the propagation of VPN routing information within an AS. List the BGP design constraints to enable Layer 3 VPNs within a provider network. Explain the operation of the Layer 3 VPN data plane within a provider network. Create a routing instance, assign interfaces to a routing instance, create routes in a routing instance, and import/export routes from a routing instance using route distinguishers/route targets. Describe the purpose of BGP extended communities, configure extended BGP extended communities, and use BGP extended communities. List the steps necessary for proper operation of a PE-CE dynamic routing protocol. List the troubleshooting and monitoring techniques for routing instances. Explain the difference between the bgp.l3vpn table and the inet.0 table of a routing instance. Monitor the operation of a CE-PE dynamic routing protocol. Explain the operation of a PE mulit-access interface in a Layer 3 VPN and list commands to modify that behavior. Describe ways to support communication between sites attached to a common PE router. Provision and troubleshoot hub-and-spoke Layer 3 VPNs, Describe the flow of control traffic and data traffic in a hub-and-spoke Layer 3 VPN. Describe QoS mechanisms available in L3VPNs. Configure L3VPN over GRE tunnels. Describe the RFC 4364 VPN options. Describe the carrier-of-carriers model. Configure the carrier-of-carriers and ''Option C'' configuration. Describe the flow of control and data traffic in a draft-rosen multicast VPN. Describe the configuration steps for establishing a draft-rosen multicast VPN. Monitor and verify the operation of draft-rosen multicast VPNs. Describe the flow of control traffic and data traffic in a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Monitor and verify the operation of next-generation multicast VPNs. This three-day course is designed to provide students with MPLS-based Layer 3 virtual private network (VPN) knowledge and configuration examples. Chapter 1: Course Introduction Course Introduction Chapter 2: MPLS VPNs MPLS VPNs Provider-Provisioned VPNs Chapter 3: Layer 3 VPNs Layer 3 VPN Terminology VPN-IPv4 Address Structure Operational Characteristics Chapter 4: Basic Layer 3 VPN Configuration Preliminary Steps PE Router Configuration Lab: Layer 3 VPN with Static and BGP Routing Chapter 5: Layer 3 VPN Scaling and Internet Access Scaling Layer 3 VPNs Public Internet Access Options Lab: LDP over RSVP Tunnels and Public Internet Access Chapter 6: Layer 3 VPNs ? Advanced Topics Exchanging Routes between Routing Instances Hub-and-Spoke Topologies Layer 3 VPN CoS Options Layer 3 VPN and GRE Tunneling Integration Layer 3 VPN and IPSec Integration Layer 3 VPN Egress Protection BGP prefix-independent convergence (PIC) edge for MPLS VPNs VRF Localization Provider Edge Link Protection Support for configuring more than 3 million L3VPN Labels Lab: GRE Tunneling Chapter 7: Interprovider Backbones for Layer 3 VPNs Hierarchical VPN Models Carrier-of-Carriers Model Option C Configuration Lab: Carrier of Carrier Layer 3 VPNs Chapter 8: Troubleshooting Layer 3 VPNs Working with Multiple Layers Troubleshooting Commands on a PE Device Multiaccess Interfaces in Layer 3 VPNs PE and CE-based Traceroutes Layer 3 VPN Monitoring Commands Lab: Troubleshooting Layer 3 VPNs Chapter 9: Draft Rosen Multicast VPNs Multicast Overview Draft Rosen MVPN Overvie Draft Rosen MVPN Operation Configuration Monitoring Chapter 10: Next Generation Multicast VPNs Multicast VPN Overview Next-Generation MVPN Operation Configuration Monitoring Internet Multicast Ingress Replication Internet Multicast Signaling and Data Plane Configuring MVPN Internet Multicast Monitoring MVPN Internet Multicast Lab: MVPN Internet Multicast
Duration 5 Days 30 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the various OSPF link-state advertisement (LSA) types. Explain the flooding of LSAs in an OSPF network. Describe the shortest-path-first (SPF) algorithm. Describe OSPF link metrics. Describe the various OSPF authentication methods. Explain the differences between OSPFv2 and OSPFv3. Describe OSPF area types and operations. Configure various OSPF area types. Summarize and restrict routes. Configure OSPF multi-area adjacencies. Configure OSPF virtual links. Explain OSPF external reachability. List useful commands that are used to troubleshoot and verify OSPF. Isolate different OSPF issues. Describe BGP operations. Configure various BGP options. Explain the route selection process for BGP. Describe how to alter the route selection process. Explain the use of routing policies in BGP. Explain how BGP routes are processed. Describe the various BGP attributes and their use. Manipulate common BGP attributes. Review common BGP troubleshooting procedures. List common BGP troubleshooting commands. Identify issues with BGP peering. Explain reasons to use BGP in the Enterprise. Explain how ISP policies can influence external connectivity. Describe three common routing policies for external connectivity in the enterprise. Identify common commands for troubleshooting routing policy. Describe basic multicast terminology. Describe the multicast address space. Describe how RPF is used in a multicast network. Describe the basic functionality of IGMP. Describe the multicast service models and modes. Describe PIM-SM operation and configuration when using the ASM model. Describe PIM-SM operation and configuration when using the SSM model. Verify and troubleshoot multicast. Identify environments that may require a modified CoS implementation. Describe the various CoS components and their respective functions. Explain the CoS processing along with CoS defaults on SRX Series devices. Describe situations in which some CoS features are used in the enterprise. Describe the use of the Real-Time Performance Monitoring tool. Verify and troubleshoot CoS. Describe a traditional Campus network design. Understand the need for a new architectural design. Describe the five key concepts of the Evolved Core. Describe the benefits of a Layer 3-based Campus Networks. Describe Layer 2 tunneling. Explain VXLAN functionality. Describe VXLAN gateways. Describe EVPN features. Describe EVPN operations. This five-day course is designed to provide students with the tools required for implementing, monitoring, and troubleshooting Layer 3 components in an enterprise network. Chapter 1: Course Introduction Course Introduction Chapter 2: OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication OSPFv3 Lab 1: Configuring and Monitoring OSPF Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation Stub Area Configuration NSSA Operation NSSA Configuration Route Summarization Lab 2: Configuring and Monitoring OSPF Areas and Route Summarization Chapter 4: Advanced OSPF Options OSPF Multi-Area Adjacencies Virtual Links External Reachability Lab 3: Configuring and Monitoring Routing Policy and Advanced OSPF Options Chapter 5: Troubleshooting Troubleshooting LSDB Consistency Issues Case Study: Adjacency Issues Lab: Troubleshooting OSPF Chapter 6: BGP Review of BGP BGP Configuration Options BGP Operations BGP Path Selection and Options Lab: Implementing BGP Chapter 7: BGP Attributes and Policy Policy and BGP BGP Attributes Details and Manipulation of Common BGP Path Attributes Lab: BGP Attributes Chapter 8: Troubleshooting BGP BGP Troubleshooting BGP Case Study Lab: Troubleshooting BGP Chapter 9: Enterprise Routing Policies Enterprise BGP Core Network Design Enterprise External Network Deployment Lab: Implementing Enterprise Routing Policies Chapter 10: Troubleshooting Policies Routing Policy Structure Using RegEx Routing Policy Troubleshooting Case Study Lab: Troubleshooting Routing Policies Chapter 11: Introduction to Multicast Overview of Multicast Multicast Addressing RPF IGMP Lab: PIM-SM Chapter 12: Multicast Routing Protocols and SSM Overview of Multicast Routing Protocols PIM-SM Using the ASM Model PIM-SM Using the SSM Model Lab: Implementing PIM-SM Lab: Implementing SSM Chapter 13: Troubleshooting Multicast Multicast Troubleshooting Multicast Case Study Lab: Troubleshooting Multicast Chapter 14: Class of Service CoS Components Review and Case Study CoS Processing and CoS Defaults on the SRX Series Device Policing Virtual Channels Monitoring with Resource Performance Monitoring Lab 9: Implementing CoS Features in the Enterprise Chapter 15: Troubleshooting Class of Service CoS Troubleshooting CoS Case Study Lab: Troubleshooting Class of Service Chapter 16: Enterprise Architectures Traditional Enterprise Networks A New Architecture Key Concepts of the Evolved Core IP Fabric Campus Design Chapter 17: VXLAN Layer 2 Connectivity over a Layer 3 Network VXLAN Overview VXLAN Gateways Chapter 18: EVPN-VXLAN Overview of EVPN EVPN Operations EVPN and VXLAN Chapter 19: Configuring EVPN-VXLAN Configuring EVPN-VXLAN Spine Only network Add IP Fabric leaf nodes to a Spine Only design Configuring a new IP Fabric EVPN-VXLAN network Chapter 20: Migrating to an IP Fabric EVPN Routes Useful EVPN Commands Appendix A: BGP Route Reflection Route Reflection Operation Configuration and Routing Knowledge Lab: BGP Route Reflection (Optional) Appendix B: Troubleshooting IS-IS IS-IS Troubleshooting Lab: Troubleshooting IS-IS and Mixed Environments Additional course details: Nexus Humans AJER - Advanced Junos Enterprise Routing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJER - Advanced Junos Enterprise Routing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network engineers and technicians that are working in the enterprise sector. Overview - Describe the factors that led to the development of IPv6 and possible uses of this new IP structure - Describe the structure of the IPv6 address format, how IPv6 interacts with data link layer technologies, and how IPv6 is supported in Cisco IOS Software - Implement IPv6 services and applications - Understand the updates to IPv4 routing protocols needed to support IPv6 topologies - Understand multicast concepts and IPv6 multicast specifics - Evaluate the scenario and desired outcome and identify the best transition mechanism for the situation - Describe security issues, how security for IPv6 is different than for IPv4, and emerging practices for IPv6-enabled networks - Describe the standards bodies that define IPv6 address allocation, in addition to one of the leading IPv6 deployment issuesââ¬'multihoming - Describe the deployment strategies that service providers might consider when deploying IPv6 - Describe case studies for enterprise, service provider, and branch networks This course is a five-day course aimed at providing network engineers and technicians that are working in the enterprise sector with the knowledge and skills that are needed to study and configure Cisco IOS Software IPv6 features. Introduction to IPv6 Explaining the Rationale for IPv6 Evaluating IPv6 Features and Benefits Understanding Market Drivers IPv6 Operations Understanding the IPv6 Addressing Architecture Describing the IPv6 Header Format Enabling IPv6 on Hosts Enabling IPv6 on Cisco Routers Using ICMPv6 and Neighbor Discovery IPv6 Services IPv6 Mobility Describing DNS in an IPv6 Environment Understanding DHCPv6 Operations Understanding QoS Support in an IPv6 Environment Using Cisco IOS Software Features IPv6-Enabled Routing Protocols Routing with RIPng Examining OSPFv3 Examining Integrated IS-IS Examining EIGRP for IPv6 Understanding MP-BGP Configuring IPv6 Policy-Based Routing Configuring FHRP for IPv6 Configuring Route Redistribution IPv6 Multicast Services Implementing Multicast in an IPv6 Network Using IPv6 MLD IPv6 Transition Mechanisms Implementing Dual-Stack Describing IPv6 Tunneling Mechanisms IPv6 Security Configuring IPv6 ACLs Using IPsec, IKE, and VPNs Discussing Security Issues in an IPv6 Transition Environment Understanding IPv6 Security Practices Configuring Cisco IOS Firewall for IPv6 Deploying IPv6 Examining IPv6 Address Allocation Understanding the IPv6 Multihoming Issue Identifying IPv6 Enterprise Deployment Strategies IPv6 and Service Providers Identifying IPv6 Service Provider Deployment Understanding Support for IPv6 in MPLS Understanding 6VPE Understanding IPv6 Broadband Access Services IPv6 Case Studies Planning and Implementing IPv6 in Enterprise Networks Planning and Implementing IPv6 in Service Provider Networks Planning and Implementing IPv6 in Branch Networks Lab Exercises Lab 2-1: Enabling IPv6 on Hosts Lab 2-2: Using Neighbor Discovery Lab 3-1: Using Prefix Delegation Lab 4-1: Routing with OSPFv3 Lab 4-2: Routing with IS-IS Lab 4-3: Routing with EIGRP Lab 4-4: Routing with BGP and MP-BGP Lab 5-1: Multicasting Lab 6-1: Implementing Tunnels for IPv6 Lab 7-1: Configuring Advanced ACLs Lab 7-2: Implementing IPsec and IKE Lab 7-3: Configuring Cisco IOS Firewall Lab 9-1: Configuring 6PE and 6VPE Configuration Files Summary Lab Activity Solutions Teardown and Restoration Additional course details: Nexus Humans Cisco IPv6 Fundamentals, Design and Deployment 3.0 (IP6FD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco IPv6 Fundamentals, Design and Deployment 3.0 (IP6FD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for For those seeing to prepare for CCIE Enterprise Infrastructure certification Overview This course will help prepare for CCIE Enterprise Infrastructure certification The new CCIE Enterprise Infrastructure certification program prepares you for today?s expert-level job roles in enterprise infrastructure technologies. CCIE Enterprise Infrastructure now includes automation and programmability to help you scale your enterprise infrastructure. VTP VTP and different versions Pruning EtherChannel LACP Layer 2 and Layer 3 Spanning Protocol 1d, 802.1w, and 802.1s SPAN, RSPAN, and ERSPAN DMVPN All Phases Redundancy: Two Clouds One Hub Two Hubs one Cloud Two hubs two Clouds Running Routing Protocols DMVPN over MPLS EIGRP RD, CD, S, FC, FS, and FD Configuration, and hidden debugging Authentications: MD5, and SHA, Summarization Load Balancing:Equal Cost, Unequal Cost, Add-Path, Filtering, Default Route Injection Optimization: Query Propagation Boundary, IP FRR, STUB routing (All Options) Metric: Classic, Wide Metric Route Tags: Decimal and Dotted-Decimal Notations, OTP OSPFv2 Overview and special cases GRE or Virtual-Links LSAs, FA, and RFCs (1583, 1587, 2328, 3101, 5185 and many more) Best Path Selection Network Types Area Types Optimization: GTSM, LFA, Default Route Injection Authentication: RFC 2328, RFC 5709, Summarization, Filtering BGP States Establishing a Peer Session: Regular method,Peer-Groups,Templates,Best Path Selection Attributes: Weight, AS-Path, Origin, Next-Hop, Local-Preference, Atomic-Aggregate Communities, Aggregator, and MED Load Balancing: Equal Cost,Unequal Cost,Conditional Advertisement,Out/In Bound Route Filtering and the order,ORF,Multihoming Scenarios AS-Path Manipulation: Regexp,Local-as,Allow-as,Remove-Private-as Convergence and Scalability: Route Reflectors,Confederation,Aggregation (All Options) Other BGP Features: MultiPath,Add-Path,Route-Refresh,Soft Reconfiguration IPv6 Acquiring an IPv6 Address: IPv6 General Prefix SLAAC DHCPv6 Rapid-Commit Relay Prefix Delegation IPv6 and DMVPN EIGRPv6 OSPFv3: Both flavors, LSAs, RFCs BGP for IPv6: IPv6 transport, and IPv4 route exchange Transitional Solutions: NAT-PT,6VPE,Multicast,MLD,Static RP,BSR,Embedded RP,IPv6 Traffic Filters,RA Guard,ND Inspection MPLS LDP, VRFs, RD, and RT L3VPNs Route Leaking PE to CE Routing Security Control Plane Policing VACLs Storm Control DHCP Snooping IP Source Guard DAI Private VLANs Port Security Access-lists uRPF Device Tracking IPsec Identity Use Case For FlexVPN: Site-to-Site, IKEv1, and IKEv2 Using Preshared Keys 1x Port Base Authentication : Device Roles,Port States,Authentication Process,Host Modes Network Services FHRP: HSRP, VRRP, and GLBP NAT: Static NAT, and PAT,Dynamic NAT,Policy-Base NAT,VRF-Aware NAT,VASI NAT Software Defined Infrastructure Cisco SD Access: Design a Cisco SD Access solution Underlay network (IS-IS, manual/PnP) Overlay fabric design (LISP, VXLAN, Cisco TrustSec) Fabric domains (single-site and multi-site using SD-WAN transit) Cisco SD Access deployment: Cisco DNA Center device discovery and device management Add fabric node devices to an existing fabric Host onboarding (wired endpoints only) Fabric border handoff Segmentation Macro-level segmentation using VNs Micro-level segmentation using SGTs (using Cisco ISE) Assurance Network and client health (360) Monitoring and troubleshooting Cisco SD-WAN: Design a Cisco SD-WAN solution Orchestration plane (vBond, NAT) Management Plane (vManage) Control Plane (vSmart, OMP) Data Plane (vEdge/cEdge) WAN edge deployment Onboarding new edge routers Orchestration with zero-touch provisioning/PnP OMP TLOC Configuration templates Localized policies (only QoS) Centralized policies Application aware Routing Topologies
Duration 5 Days 30 CPD hours This course is intended for Enterprise network engineers System engineers System administrators Network administrators Overview After taking this course, you should be able to: Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6 Optimize classic EIGRP and named EIGRP for IPv4 and IPv6 Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6 Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments Optimize OSPFv2 and OSPFv3 behavior Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6 Implement route redistribution using filtering mechanisms Troubleshoot redistribution Implement path control using Policy-Based Routing (PBR) and IP service level agreement (SLA) Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments Optimize MP-BGP in IPv4 and IPv6 environments Troubleshoot MP-BGP for IPv4 and IPv6 Describe the features of Multiprotocol Label Switching (MPLS) Describe the major architectural components of an MPLS VPN Identify the routing and packet forwarding functionalities for MPLS VPNs Explain how packets are forwarded in an MPLS VPN environment Implement Cisco Internetwork Operating System (IOS) Dynamic Multipoint VPNs (DMVPNs) Implement Dynamic Host Configuration Protocol (DHCP) Describe the tools available to secure the IPV6 first hop Troubleshoot Cisco router security features Troubleshoot infrastructure security and services The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course. This course may earn a Credly Badge Course Outline Implementing EIGRP Optimizing EIGRP Troubleshooting EIGRP Implementing OSPF Optimizing OSPF Troubleshooting OSPF Implementing Internal Border Gateway Protocol (IBGP) Optimizing BGP Implementing MP-BGP Troubleshooting BGP Configuring Redistribution Troubleshooting Redistribution Implementing Path Control Exploring MPLS Introducing MPLS L3 VPN Architecture Introducing MPLS L3 VPN Routing Configuring Virtual Routing and Forwarding (VRF)-Lite Implementing DMVPN Implementing DHCP Troubleshooting DHCP Introducing IPv6 First Hop Security Securing Cisco Routers Troubleshooting Infrastructure Security and Services Lab Outline Configure EIGRP Using Classic Mode and Named Mode for IPv4 and IPv6 Verify the EIGRP Topology Table Configure EIGRP Stub Routing, Summarization, and Default Routing Configure EIGRP Load Balancing and Authentication LAB: Troubleshoot EIGRP Issues Configure OSPFv3 for IPv4 and IPv6 Verify the Link-State Database Configure OSPF Stub Areas and Summarization Configure OSPF Authentication Troubleshoot OSPF Implement Routing Protocol Redistribution Manipulate Redistribution Manipulate Redistribution Using Route Maps Troubleshoot Redistribution Issues Implement PBR Configure IBGP and External Border Gateway Protocol (EBGP) Implement BGP Path Selection Configure BGP Advanced Features Configure BGP Route Reflectors Configure MP-BGP for IPv4 and IPv6 Troubleshoot BGP Issues Implement PBR Configure Routing with VRF-Lite Implement Cisco IOS DMVPN Obtain IPv6 Addresses Dynamically Troubleshoot DHCPv4 and DHCPv6 Issues Troubleshoot IPv4 and IPv6 Access Control List (ACL) Issues Configure and Verify Control Plane Policing Configure and Verify Unicast Reverse Path Forwarding (uRPF) Troubleshoot Network Management Protocol Issues: Lab 1 Troubleshoot Network Management Protocol Issues: Lab 2
Duration 3 Days 18 CPD hours This course is intended for This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP LTM system. This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to both commonly used and advanced BIG-IP LTM features and functionality. Incorporating lecture, extensive hands-on labs, and classroom discussion, the course helps students build the well-rounded skill set needed to manage BIG-IP LTM systems as part of a flexible and high performance application delivery network. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Module 3: Load Balancing Traffic with LTM Exploring Load Balancing Options Using Priority Group Activation and Fallback Host Comparing Member and Node Load Balancing Module 4: Modifying Traffic Behavior with Persistence Reviewing Persistence Introducing SSL Persistence Introducing SIP Persistence Introducing Universal Persistence Introducing Destination Address Affinity Persistence Using Match Across Options for Persistence Module 5: Monitoring Application Health Differentiating Monitor Types Customizing the HTTP Monitor Monitoring an Alias Address and Port Monitoring a Path vs. Monitoring a Device Managing Multiple Monitors Using Application Check Monitors Using Manual Resume and Advanced Monitor Timer Settings Module 6: Processing Traffic with Virtual Servers Understanding the Need for Other Virtual Server Types Forwarding Traffic with a Virtual Server Understanding Virtual Server Order of Precedence Path Load Balancing Module 7: Processing Traffic with SNATs Overview of SNATs Using SNAT Pools SNATs as Listeners SNAT Specificity VIP Bounceback Additional SNAT Options Network Packet Processing Module 8: Modifying Traffic Behavior with Profiles Profiles Overview TCP Express Optimization TCP Profiles Overview HTTP Profile Options OneConnect Offloading HTTP Compression to BIG-IP HTTP Caching Stream Profiles F5 Acceleration Technologies Module 9: Selected Topics VLAN, VLAN Tagging, and Trunking Restricting Network Access SNMP Features Segmenting Network Traffic with Route Domains Module 10: Deploying Application Services with iApps Simplifying Application Deployment with iApps Using iApps Templates Deploying an Application Service Leveraging the iApps Ecosystem on DevCentral Module 11: Customizing Application Delivery with iRules and Local Traffic Policies Getting Started with iRules Configuring and Managing Policy Rules Module 12: Securing Application Delivery with LTM Understanding Today?s Threat Landscape Integrating LTM Into Your Security Strategy Defending Your Environment Against SYN Flood Attacks Defending Your Environment Against Other Volumetric Attacks Addressing Application Vulnerabilities with iRules and Local Traffic Policies Detecting and Mitigating Other Common HTTP Threats Module 13: Final Lab Project About the Final Lab Project
Duration 2 Days 12 CPD hours This course is intended for Enterprise network system installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Identify the various network elements of the Cisco SD-WAN solution. Deploy WAN Edge routers. Create templates to aid in the deployment and operation of the Cisco SD-WAN network. Configure and verify Cisco SD-WAN overlay routing. Create simple policies to control traffic flow through the Cisco SD-WAN fabric. The Cisco SD-WAN Operation and Deployment (SDWFND) v2.0 course provides a comprehensive overview of the Cisco© Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.The course will allow you to earn 16 Continuing Education (CE) credits toward recertification. Course Outline Cisco SD-WAN Solution Components Cisco SD-WAN Network Deployment Cisco SD-WAN Configuration Management Cisco SD-WAN Overlay Routing Cisco SD-WAN Policies
Duration 5 Days 30 CPD hours This course is intended for Network design engineers Network engineers System administrators Overview After taking this course, you should be able to: Design Enhanced Interior Gateway Routing Protocol (EIGRP) internal routing for the enterprise network Design Open Shortest Path First (OSPF) internal routing for the enterprise network Design Intermediate System to Intermediate System (IS-IS) internal routing for the enterprise network Design a network based on customer requirements Design Border Gateway Protocol (BGP) routing for the enterprise network Describe the different types and uses of Multiprotocol BGP (MP-BGP) address families Describe BGP load sharing Design a BGP network based on customer requirements Decide where the L2/L3 boundary will be in your Campus network and make design decisions Describe Layer 2 design considerations for Enterprise Campus networks Design a LAN network based on customer requirements Describe Layer 3 design considerations in an Enterprise Campus network Examine Cisco SD-Access fundamental concepts Describe Cisco SD-Access Fabric Design Design a Software-Defined Access (SD-Access) Campus Fabric based on customer requirements Design service provider-managed VPNs Design enterprise-managed VPNs Design a resilient WAN Design a resilient WAN network based on customer requirements Examine the Cisco SD-WAN architecture Describe Cisco SD-WAN deployment options Design Cisco SD-WAN redundancy Explain the basic principles of QoS Design Quality of Service (QoS) for the WAN Design QoS for enterprise network based on customer requirements Explain the basic principles of multicast Designing rendezvous point distribution solutions Describe high-level considerations when doing IP addressing design Create an IPv6 addressing plan Plan an IPv6 deployment in an existing enterprise IPv4 network Describe the challenges that you might encounter when transitioning to IPv6 Design an IPv6 addressing plan based on customer requirements Describe Network APIs and protocols Describe Yet Another Next Generation (YANG), Network Configuration Protocol (NETCONF), and Representational State Transfer Configuration Protocol (RESTCONF) The Designing Cisco Enterprise Networks (ENSLD) v1.1 course gives you the knowledge and skills you need to design an enterprise network. This course serves as a deep dive into enterprise network design and expands on the topics covered in the Implementing and Operating Cisco© Enterprise Network Core Technologies (ENCOR) v1.0 course.This course also helps you prepare to take the 300-420 Designing Cisco Enterprise Networks (ENSLD) exam which is part of the CCNP© Enterprise and Cisco Certified Specialist - Enterprise Design certifications. Course Outline Designing EIGRP Routing Designing OSPF Routing Designing IS-IS Routing Design Case Study Activity: Designing Enterprise Connectivity Designing BGP Routing and Redundancy Understanding BGP Address Families and Attributes Design Case Study Activity: Designing an Enterprise Network with BGP Internet Connectivity Designing the Enterprise Campus LAN Designing Layer 2 Campus Design Case Study Activity: Designing an Enterprise Campus LAN Designing Layer 3 Campus Discovering the Cisco SD-Access Architecture Exploring Cisco SD-Access Fabric Design Exploring Cisco SD-Access Site Design Strategy and Considerations Design Case Study Activity: Designing Cisco SD-Access in the Enterprise Designing Service Provider-Managed VPNs Designing Enterprise-Managed VPNs Designing WAN Resiliency Design Case Study Activity: Designing Resilient Enterprise WAN Examining Cisco SD-WAN Architectures Examining Cisco SD-WAN Deployment Design Considerations Designing Cisco SD-WAN Routing and High Availability Design Case Study Activity: Designing Resilient Enterprise Cisco SD-WAN Understanding QoS Designing LAN and WAN QoS Design Case Study Activity: Designing QoS in an Enterprise Network Exploring Multicast with Protocol-Independent Multicast-Sparse Mode (PIM-SM) Designing Rendezvous Point Distribution Solutions Designing an IPv4 Address Plan Exploring IPv6 Deploying IPv6 Design Case Study Activity: Designing an Enterprise IPv6 Network Introducing Network APIs and Protocols Exploring YANG, NETCONF, RESTCONF, and Model-Driven Telemetry Additional course details: Nexus Humans Cisco Designing Cisco Enterprise Networks v1.1 (ENSLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Enterprise Networks v1.1 (ENSLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This course aims to prepare individuals for the AWS Certified Solutions Architect Associate exam. It covers essential AWS services, cloud architecture design, deployment strategies, and best practices for managing various AWS components. Learning Outcomes: Understand the fundamental concepts of AWS Cloud Services and their application in real-world scenarios. Design and implement AWS Storage and Virtual Private Cloud (VPC) solutions. Learn how to design, implement, and manage Compute Services effectively. Master Identity and Access Management (IAM) and its best practices for secure access control. Explore Auto Scaling Solutions and Virtual Network Services to optimize AWS infrastructure. Gain proficiency in deploying applications and databases on AWS. Discover additional AWS services and their integration for comprehensive cloud solutions. Develop insights into achieving operational excellence with AWS services. Why buy this AWS Certified Solutions Architect Associate Preparation? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the AWS Certified Solutions Architect Associate Preparation there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This AWS Certified Solutions Architect Associate Preparation course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This AWS Certified Solutions Architect Associate Preparation does not require you to have any prior qualifications or experience. You can just enrol and start learning.This AWS Certified Solutions Architect Associate Preparation was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This AWS Certified Solutions Architect Associate Preparation is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Section 01: Introduction Introduction 00:03:00 Section 02: Exam Tips and Tricks What is AWS? 00:02:00 Why use AWS? 00:03:00 How to Get Started with AWS 00:04:00 AWS Certifications 00:04:00 Preparation Resources 00:02:00 Benefits of Certification 00:02:00 AWS CSA-A Overview 00:04:00 What's New on the 2020 Updated Exam? 00:03:00 AWS CSA-A Exam Objectives 00:06:00 The Four Key Areas (Compute, Networking, Storage, and Databases) 00:04:00 Master the Knowledge Areas 00:02:00 Use the System 00:05:00 Take Notes 00:03:00 Be Mentally and Physically Prepared 00:04:00 Take the Exam 00:04:00 Section 03: AWS Cloud Services Overview Cloud Computing Defined 00:08:00 Benefits of Cloud Computing 00:10:00 Cloud Computing Models 00:07:00 History 00:07:00 Platform 00:06:00 Services, Part 1 00:10:00 Services, Part 2 00:08:00 Security and Compliance 00:07:00 Regions and Availability 00:06:00 Section 04: AWS Storage Design Storage Services 00:07:00 S3 Storage Class 00:07:00 S3 Terminology 00:09:00 S3 Advanced Features 00:08:00 Creating S3 Buckets Lab 00:08:00 S3 Bucket Properties 00:08:00 S3 Managing Objects Lab 00:11:00 Glacier 00:07:00 Setting up a Glacier Vault Lab 00:08:00 S3 and Tape Gateway 00:06:00 S3 Enhanced Features 00:08:00 Elastic Block Store (EBS) 00:08:00 Creating EBS Volumes Lab 00:07:00 Elastic File System (EFS) 00:07:00 Creating an EFS File System Lab 00:07:00 EFS and PrivateLink 00:03:00 Intro to Amazon FSx 00:06:00 Hands-on with FSx 00:06:00 Integrating on-Premises Storage 00:07:00 Storage Access Security Lab 00:10:00 Storage Performance 00:08:00 Section 05: Virtual Private Cloud (VPC) Virtual Private Cloud (VPC) Overview 00:10:00 Creating a VPC Lab 00:11:00 Configuring DHCP Options Lab 00:04:00 Elastic IP Addresses 00:07:00 Elastic Network Interfaces (ENIs) 00:05:00 Endpoints 00:07:00 VPC Peering 00:08:00 Creating a VPC Peering Connection Lab 00:10:00 Security Groups Overview 00:07:00 Network Address Translation (NAT) 00:11:00 Gateways (VPGs and CGWs) 00:08:00 VPN Configuration Option 00:04:00 Section 06: Compute Services Design EC2 Overview 00:11:00 EC2 Instance Types 00:11:00 EC2 Pricing 00:13:00 EBS and EC2 00:05:00 Section 07: Compute Services Implementation Launching an EC2 Linux Instance Lab 00:13:00 Configuring an EC2 Linux Instance Lab 00:08:00 Setting up an EC2 Windows Instance Lab 00:12:00 Shared Tenancy 00:05:00 Dedicated Hosts 00:08:00 Dedicated Instances 00:06:00 AMI Virtualization 00:12:00 Section 08: Compute Services Management Instance Management 00:09:00 Connecting to Instances Lab 00:09:00 Working with Security Groups 00:10:00 Working with Security Groups Lab 00:10:00 Advanced EC2 Management 00:06:00 AWS Batch 00:06:00 Elastic Container Service (ECS) 00:08:00 Elastic Beanstalk Environment 00:11:00 Section 09: Identity and Access Management (IAM) Identity and Access Management (IAM) Overview 00:07:00 Principals 00:10:00 Root User 00:06:00 Authentication 00:06:00 Authorization Policies 00:13:00 Multi-Factor Authentication 00:08:00 Key Rotation 00:10:00 Multiple Permissions 00:06:00 AWS Compliance Program 00:07:00 AWS Security Hub 00:06:00 Shared Responsibility Models 00:06:00 Section 10: IAM Best Practices User Accounts 00:11:00 Password Policies 00:09:00 Credential Rotation 00:06:00 Principle of Least Privilege 00:05:00 IAM Roles 00:08:00 Policy Conditions 00:08:00 CloudTrail 00:12:00 Section 11: Auto Scaling Solutions Auto Scaling Overview 00:06:00 Auto Scaling Groups 00:04:00 Termination Policies 00:07:00 Auto Scaling Configuration Lab 00:13:00 Launch Methods 00:04:00 Load Balancer Concepts 00:08:00 Elastic Load Balancing (ELB) 00:10:00 Section 12: Virtual Network Services DNS 00:14:00 Configuring DNS Lab 00:07:00 Configuring Route 53 Lab 00:13:00 Configuring ACLs and NACLs Lab 00:09:00 Flow Logs 00:07:00 Section 13: AWS Application Deployment Application and Deployment Services 00:04:00 Lambda 00:06:00 API Gateway 00:09:00 Kinesis 00:06:00 Kinesis Data Streams and Firehose 00:06:00 Kinesis Data Analytics 00:04:00 Reference Architectures 00:06:00 CloudFront 00:10:00 Web Application Firewall (WAF) 00:09:00 Simple Queue Service (SQS) 00:10:00 Simple Notification Service (SNS) 00:08:00 Simple Workflow (SWF) 00:07:00 Step Functions 00:05:00 OpsWorks 00:08:00 Cognito 00:04:00 Elastic MapReduce (EMR) 00:05:00 CloudFormation 00:10:00 CloudFormation Properties 00:03:00 CloudWatch 00:06:00 Trusted Advisor 00:07:00 Organizations 00:09:00 Section 14: AWS Database Design Database Types 00:08:00 Relational Databases 00:08:00 Database Hosting Methods 00:05:00 High Availability Solutions 00:06:00 Scalability Solutions 00:06:00 Database Security 00:08:00 Aurora 00:06:00 Redshift 00:11:00 DynamoDB 00:10:00 Section 15: Database Deployment DynamoDB Tables Lab 00:08:00 MySQL Lab 00:13:00 Configuration Lab 00:13:00 Backups Lab 00:04:00 Restore Lab 00:04:00 Snapshot Lab 00:08:00 Monitoring Lab 00:06:00 Section 16: Additional AWS Services Media Content Delivery 00:13:00 Desktop and Appstreaming 00:06:00 ElastiCache 00:05:00 Security Services Lab 00:12:00 Analytics Engines 00:11:00 Development Operations (DevOps) 00:12:00 AWS Solutions 00:05:00 AWS Transit Gateway 00:03:00 AWS Backup 00:04:00 AWS Cost Explorer 00:04:00 Section 17: Operational Excellence with AWS The Operational Excellence Process 00:08:00 Widget Makers Scenario 00:06:00 Resilient Design 00:08:00 Resilient Design Scenario 00:05:00 Performant Design 00:09:00 Performant Design Scenario 00:06:00 Secure Design 00:08:00 Secure Design Scenario 00:05:00 Cost Optimization 00:07:00 Cost Optimization Scenario 00:05:00 General Best Practices 00:07:00