|
ENCOR - Implementing and Operating Cisco Enterprise Network Core Technologies v 1.4
 | 40 |
|
 | 26-30.05.2025 очно/онлайн. Супер цена |
|
Course Description
The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.4 training gives you the knowledge and skills needed to install, configure, operate, and troubleshoot an enterprise network and introduces you to overlay network design by using SD-Access and SD-WAN solutions. You’ll also learn to understand and implement security principles and automation and programmability within an enterprise network.
This training will help you:
-
Configure and implement identified solutions by applying planned implementation processes using Cisco IOS Software commands and applications.
-
Verify appropriate show and debug commands and applications to ensure correct solution implementation and performance.
-
Troubleshoot appropriate show and debug commands and applications to identify the cause of basic-level network issues and correctly implement a solution that ensures that the network is performing as desired.
Who Should Enroll
-
Entry- to mid-level network engineers
-
Network administrators
-
Network support technicians
-
Help desk technicians
Course Objectives
After taking this training, you should be able to:
-
Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
-
Compare and contrast the various hardware and software switching mechanisms and operation while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM) along with process switching, fast switching, and Cisco Express Forwarding concepts
-
Troubleshoot Layer 2 connectivity using VLANs and trunking
-
Implement redundant switched networks using Spanning Tree Protocol
-
Troubleshoot link aggregation using Etherchannel
-
Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
-
Implement and optimize Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types and areas, summarization, and route filtering for IPv4 and IPv6
-
Implement External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
-
Implement network redundancy using protocols such as Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
-
Implement internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
-
Describe the virtualization technology of servers, switches, and the various network devices and components
-
Implement overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
-
Describe the components and concepts of wireless networking, including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
-
Describe the various wireless deployment models available, including autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
-
Describe wireless roaming and location services
-
Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
-
Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-shared Key (PSK) wireless client authentication on a WLC
-
Troubleshoot wireless client connectivity issues using various available tools
-
Troubleshoot Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
-
Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
-
Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
-
Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
-
Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
-
Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
-
Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
-
Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
-
Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
-
Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
-
Explain basic Python components and conditionals with script writing and analysis
-
Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
-
Describe APIs in Cisco DNA Center and Manage
Course Prerequisites
Knowledge and skills you should have before attending this training:
-
Implementation of Enterprise LAN networks
-
Basic understanding of Enterprise routing and wireless connectivity
-
Basic understanding of Python scripting
Содержание курса
-
Section 1: Examining Cisco Enterprise Network Architecture
Objectives
Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
Cisco Enterprise Architecture Model
Campus LAN Design Fundamentals
Traditional Multilayer Campus Layer Design
Campus Distribution Layer Design
Fabric and Cloud Enterprise Design
Section 2: Exploring Cisco Switching Paths
Objectives
Compare and contrast the various hardware and software switching mechanisms and operations, while defining the TCAM and CAM, along with process switching, fast switching, and Cisco Express Forwarding concepts.
Layer 2 Switch Operation
Discovery 1: Investigate the CAM
Control Plane and Data Plane
Cisco Switching Mechanisms
Cisco Express Forwarding Overview
Discovery 2: Analyze Cisco Express Forwarding
Section 3: Implementing Campus LAN Connectivity
Objectives
Explain the implementation of layer 2 connectivity using VLANs and trunking
Creating a VLAN
IEEE 802.1Q
Discovery 3: Troubleshoot VLAN and Trunk Issues
Inter-VLAN Routing
Section 4: Building Redundant Switched Topology
Objectives
Explain the implementation of layer 2 connectivity using spanning tree
STP Overview
STP Operation
STP Types and Features
Discovery 4: Tune STP and Configure RSTP
Introducing MST
Discovery 5: Configure Multiple STP
PortFast and BPDU Guard
Enhance STP with Root Guard
Section 5: Implementing Layer 2 Port Aggregation
Objectives
Explain the implementation of layer 2 connectivity using EtherChannel
Need for EtherChannel
EtherChannel Mode Interactions
Layer 2 EtherChannel Configuration Guidelines
EtherChannel Load-Balancing Options
Troubleshoot EtherChannel Issues
Discovery 6: Troubleshoot EtherChannel
Describe Policy-Based Routing
Section 6: Implementing OSPF
Objectives
Describe the concepts and features of OSPF, including adjacencies, LSDB, packet types, and areas.
Describe OSPF
OSPF Process
OSPF Neighbor Adjacencies
Building a Link-State Database
OSPF LSA Types
Compare Single-Area and Multiarea OSPF
OSPF Area Structure
OSPF Network Types
Discovery 7: Implement Multiarea OSPF
Section 7: Optimizing OSPF
Objectives
Explain the optimization of OSPF, using summarization, route maps, and route filtering
OSPF Cost
Discovery 8: Implement OSPF Tuning
OSPF Route Summarization
OSPF Route Filtering Tools
Discovery 9: Apply OSPF Optimization
Compare OSPFv2 and OSPFv3
Discovery 10: Implement OSPFv3
Section 8: Explaining EIGRP
Objectives
Describe the features, metrics, and path selection concepts of EIGRP, and compare and contrast with OSPF
EIGRP Features
EIGRP Reliable Transport
Establishing EIGRP Neighbor Adjacency
EIGRP Metrics
EIGRP Path Selection
Explore EIGRP Load Balancing and Sharing
EIGRP for IPv6
Compare EIGRP and OSPF Routing Protocols
Configure EIGRP
Section 9: Exploring EBGP
Objectives
Describe EBGP interdomain routing, path select, single and dual-homed networking
Interdomain Routing with BGP
BGP Operations
Types of BGP Neighbor Relationships
BGP Path Selection
BGP Path Attributes
Discovery 11: Configure and Verify Single-Homed EBGP
Section 10: Implementing Network Redundancy
Objectives
Explain the functions, features, and configuration of network redundancy
Need for Default Gateway Redundancy
Define FHRP
Discovery 12: Implement HSRP
HSRP Advanced Features
Discovery 13: Configure VRRP
Cisco Switch High Availability Features
Section 11: Implementing NAT
Objectives
Explain the concepts, features, and function of NAT within the enterprise network
Define NAT
NAT Address Types
Explore NAT Implementations
NAT Virtual Interface
Discovery 14: Implement NAT
Section 12: Introducing Virtualization Protocols and Techniques
Objectives
Describe the virtualization technology of servers, switches, and the various network devices and components
Server Virtualization
Need for Network Virtualization
Path Isolation Overview
Introducing VRF
Discovery 15: Configure and Verify VRF
Introducing Generic Routing Encapsulation
Discovery 16: Configure and Verify a GRE Tunnel
Section 13: Exploring Virtual Private Networks and Interfaces
Objectives
Describe virtual private networks and interfaces
Site-to-Site VPN Technologies
IPsec VPN Overview
IPsec: Internet Key Exchange
IPsec Modes
IPsec VPN Types
Cisco IOS VTI
Discovery 17: Configure Static VTI Point-to-Point Tunnels
Section 14: Examining Wireless Deployment Options
Objectives
Describe the various wireless deployment models available, include autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture
Wireless Deployment Overview
Describe Autonomous AP Deployment
Describe Centralized Cisco WLC Deployment
Describe FlexConnect Deployment
Describe the Cloud-Managed Meraki Solution
Cisco Catalyst 9800 Series Controller Deployment Options
Describe Cisco Mobility Express
Section 15: Examining Wireless AP Operation
Objectives
Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
Universal AP Priming
Explore the Controller Discovery Process
Describe AP Failover
Explain High Availability
Explore AP Modes
Section 16: Implementing Wireless Client Authentication
Objectives
Configure and verify EAP, WebAuth, and PSK wireless client authentication on a WLC
Authentication Methods
PSK Authentication
802.1X User Authentication Overview
PKI and 802.1X Certificate-Based Authentication
Introduction to EAP
EAP-Transport Layer Security
Protected Extensible Authentication Protocol
EAP-Flexible Authentication via Secure Tunneling
Guest Access with WebAuth
Describe EAPOL
Initialize Centralized Cisco WLC
Getting Familiar with Cisco WLC GUI
Discovery 18: Configure Wireless Client Authentication in a Centralized Deployment
Section 17: Troubleshooting Wireless Client Connectivity
Objectives
Troubleshoot wireless client connectivity issues using various tools available
Wireless Troubleshooting Tools Overview
Spectrum Analysis
Wi-Fi Scanning
Packet Analysis
Cisco AireOS GUI and CLI Tools
Cisco Wireless Config Analyzer Express
Common Wireless Client Connectivity Issues Overview
Client to AP Connectivity
WLAN Configuration
Infrastructure Configuration
Discovery 19: Troubleshoot Wireless Client Connectivity Issues
Section 18: Implementing Network Services
Objectives
Configure devices for troubleshooting efforts by implementing NTP, SNMP best practices, using Cisco IOS IP SLAs, NetFlow and Cisco IOS Embedded Event Manager
Understanding NTP
Describe PTP
Logging Services
Discovery 20: Configure Syslog
Understanding SNMP
Introducing NetFlow
Discovery 21: Configure and Verify Flexible NetFlow
Understanding Cisco IOS EEM
Discovery 22: Configure Cisco IOS EEM
Section 19: Introducing Multicast Protocols
Objectives
Describe the concepts, purpose, and features of multicast protocols, including IGMPv2/v3, PIM dense mode/sparse mode, and rendezvous points.
Multicast Overview
Internet Group Management Protocol
Multicast Distribution Trees
IP Multicast Routing
Rendezvous Point
Section 20: Introducing QoS
Objectives
Describe the concepts and features of QoS and describe the need within the enterprise network
Understand the Impact of User Applications on the Network
Need for QoS
Describe QoS Mechanisms
Define and Interpret a QoS Policy
Section 21: Using Network Analysis Tools
Objectives
Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
Troubleshooting Concepts
Network Troubleshooting Procedures: Overview
Network Troubleshooting Procedures: Case Study
Basic Hardware Diagnostics
Filtered Show Commands
Discovery 23: Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug
Cisco IOS IP SLAs
Discovery 24: Configure and Verify Cisco IP SLAs
SPAN Overview
Remote SPAN
Encapsulated Remote Switched Port Analyzer
Cisco Packet Capture Tools Overview
Section 22: Implementing Infrastructure Security
Objectives
Configure secure administrative access for Cisco IOS devices using the CLI access, RBAC, ACL, and SSH, and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
Types of ACLs
Configure Numbered Access Lists
Use ACLs to Filter Network Traffic
Apply ACLs to Interfaces
Configure Named Access Lists
Discovery 25: Configure Standard and Extended ACLs
Control Plane Overview
Control Plane Policing
Discovery 26: Configure Control Plane Policing
Section 23: Implementing Secure Access Control
Objectives
Implement scalable administration using AAA and the local database, while exploring the features and benefits
Securing Device Access
AAA Framework Overview
Benefits of AAA Usage
Authentication Options
RADIUS and TACACS+
Enabling AAA and Configuring a Local User for Fallback
Configuring RADIUS for Console and vty Access
Configuring TACACS+ for Console and vty Access
Configure Authorization and Accounting
Discovery 27: Implement Local and Server-Based AAA
Section 24: Discovering the Basics of Python Programming
Objectives
Explain basic Python components and conditionals with script writing and analysis
Describe Python Concepts
String Data Types
Numbers Data Types
Boolean Data Types
Script Writing and Execution
Analyzing the Code
Discovery 28: Write and Troubleshoot Python Scripts
Section 25: Introducing Network Programmability Protocols
Objectives
Describe network programmability protocols
Configuration Management
Evolution of Device Management and Programmability
Data Encoding Formats
Understanding JSON
Discovery 29: Explore JSON Objects and Scripts in Python
Model-Driven Programmability Stack
Introduction to YANG
Types of YANG Models
Understanding NETCONF
Explain NETCONF and YANG
Discovery 30: Use NETCONF via SSH
Understanding REST
Understanding RESTCONF
Discovery 31: Use RESTCONF with Cisco IOS XE Software
|