ICL
In-Classroom Learning
VLT
Virtual Live Training
GTR
Class is guaranteed to Run
ODL
On-Demand Learning
START DATE | END DATE | CLASS TIMINGS | MODE | Price | LOCATION | ACTION |
---|---|---|---|---|---|---|
01/06/2020 | 01/10/2020 |
|
USD 3095 | Live Online | ||
03/30/2020 | 04/03/2020 |
|
USD 3095 | Live Online | ||
06/22/2020 | 06/26/2020 |
|
USD 3095 | Live Online | ||
09/21/2020 | 09/25/2020 |
|
USD 3095 | Live Online |
Subsequent to finishing this course the understudy ought to have the capacity to:
Depict and apply organize plan strategies
Portray and apply to organize outline ideas of measured quality and chain of command
Plan a versatile and adaptable Campus arrange
Outline a strong and adaptable availability between parts of your Enterprise organize
Plan availability to the Internet and inward directing for your system
Incorporate joint effort and remote framework into your center system
Make adaptable IPv4 and IPv6 tending to
Portray what are programming characterized arranges and depict illustration arrangements
Who Should Attend
The intended interest group for the DESGN course comprises of people looking for the Cisco Certified Design Associate (CCDA) affirmation and those people focusing towards the CCDP (Cisco Certified Design Professional) accreditation. The course is likewise focused at pre-deals and post-deals arrange engineers associated with the Enterprise organize configuration, arranging and usage. (The post-deals arrange engineers engaged with the user will be associated with giving criticism to the pre-deals organize builds and right conceivable plan defects).
Module 1: Design Methodologies
Lesson 1: Design Life Cycle
Business-Driven Network
Plan, Build, Manage
Plan Phase
Manufacture Phase
Oversee Phase
Task Deliverables
Synopsis
Lesson 2: Characterizing Existing Network
Why Is Good Characterization Necessary?
Ventures of Gathering Information
Inspecting the Existing Network
Utilizing Tools to Characterize Existing Network
Contextual investigation: Using SNMP to Gather Information
Contextual investigation: Using NetFlow to Gather Information
Contextual investigation: Using CDP or LLDP to Gather Information
Archive the Existing Network
Synopsis
Lesson 3: Top-Down Approach
Top-Down versus Base Up
Advantages and Drawbacks of Top-Down Approach
Contextual investigation: Top-Down Approach Design
Pilots and Prototypes
Outline
Lesson 4: Module Summary
Lesson 5: Module Self-Check
Module 2: Network Design Objectives
Lesson 1: Building a Modular Network
System Convergence
For what reason Would You Modularize?
How to Modularize?
Where Should You Hide Information?
Measure of Information Hiding
Seclusion and Fault Domains
How Scalability Can Be Achieved Through Modular Design
How Resiliency Is Achieved Through Modular Design
Contextual investigation: Modular Network Design
Run of the mill Enterprise Network Modules
Outline
Lesson 2: Applying Modularity: Hierarchy in a Network
Center point and-Spoke Design
Three-Layer Hierarchy
Access Layer
Appropriation Layer
Center Layer
Two-Layer Hierarchy
Multilayer Hierarchy
Outline
Lesson 3: Applying Modularity: Virtualization Overview
What Is Virtualization?
Explanations behind Virtualization
Sorts of Virtualization
Results of Virtualization
Outline
Lesson 4: Module Summary
References
Lesson 5: Module Self-Check
Module 3: Campus Network Design
Lesson 1: Layer 2/Layer 3 Demarcation
End-to-End versus Nearby VLANs
Conventional Layer 2 Access Layer
Refreshed Layer 2 Access Layer
Layer 3 Access Layer
Directed or Switched Access Layer?
Half and half Access Layer
Contextual investigation: Common Access-Distribution Interconnection Designs
Little and Medium Campus Design Options
Outline
Lesson 2: Layer 2 Design Considerations
VLAN and Trunk Considerations
VTP Considerations
STP Considerations
STP Root Bridge Placement
Arrangement of STP with FHRP
Predictable STP Metrics
Cisco STP Toolkit
STP Stability Mechanism Recommendations
Issue with Unidirectional Links
Contrasting Loop Guard and UDLD
UDLD Recommended Practices
Requirement for MST
MST Recommended Practices
Rundown
Lesson 3: High Availability Considerations
Overseeing Bandwidth and Oversubscription
Port Aggregation Considerations
VSS Considerations
Stacking Considerations
To start with Hop Redundancy
HSRP/VRRP Subsecond Failover
HSRP/VRRP Preempt Delay
HSRP/VRRP Load Sharing
HSRP/VRRP Tracking
Case for GLBP
Argument Against GLBP
Rundown
Lesson 4: Layer 3 Design Considerations
Building Triangles
Repetitive Links
Steering Convergence
Farthest point Peering Across the Access Layer
Abridge at Distribution Layer
Rundown
Lesson 5: Traffic and Interconnections
System Requirements of Applications
Customer Server Traffic Considerations
Intrabuilding Structure Considerations
Interbuilding Structure Considerations
Transmission Media Considerations
Contextual analysis: Transmission Media
Rundown
Lesson 6: Module Summary
References
Lesson 7: Module Self-Check
Module 4: Enterprise Network Design
Lesson 1: Designing a Secure Network
Enter Threats in Campus
Security Goals
Securing the Perimeter
Prologue to Firewalls
Kinds of Firewalls
Firewall Recommended Practices
IPS/IDS Fundamentals
IPS/IDS Recommended Practices
System Access Control
Security Implications of Client Access Methods
Synopsis
Lesson 2: Edge Connectivity Design
Edge Overview
DMZ Overview
DMZ Segmentation
DMZ Service Placing
Web Connectivity
Web Edge with High Availability
VPN Design
Site-to-Site VPN Use Cases
Review of Remote Access Flavors
Security Services Design
Edge Device Selection
NAT Placement
Synopsis
Lesson 3: WAN Design
WAN Topologies
By what method Should I Connect Remote Sites?
WAN Considerations
Supplier Managed VPNs: Layer 2 versus Layer 3
MPLS Overview
Layer 3 VPN: MPLS/VPN
Layer 3 VPN: MPLS/VPN Considerations
Layer 2 VPN: VPWS
Layer 2 VPN: VPWS Considerations
Layer 2 VPN: VPLS
Layer 2 VPN: VPLS Considerations
Supplier Managed VPNs: Making Choices
Presenting Enterprise-Managed VPNs
Conveying Enterprise-Managed VPN over Provider-Managed VPN
IPsec Overview
Venture Managed VPN: IPsec Tunnel Mode
Venture Managed VPNs: GRE over IPsec
Venture Managed VPNs: DMVPN
Venture Managed VPNs: IPsec VTI
Venture Managed VPNs: GETVPN
Venture Managed VPNs: Making Choices
Synopsis
Lesson 4: Branch Design
Branch Putting Pressure on the WAN
Regular Branch Connectivity Options
Branch Redundancy Options
Single-Carrier WANs versus Double Carrier WANs
Single-Carrier MPLS/VPN Site Types
Double Carrier MPLS/VPN WAN
Half and half WAN: Layer 3 Provider VPN and IPSec VPN
Half and half WAN: Layer 2 Provider VPN and IPSec VPN
Branch Internet Access?Centralized or Local?
Remote-Site LAN: Flat Layer 2
Remote-Site LAN: Collapsed Core
Synopsis
Lesson 5: Connecting to the Data Center
Server farm Architecture
Server farm Ethernet Infrastructure
Server farm Storage Integration
Server farm Reference Architecture
Server Virtualization and Virtual Switch
Versatile Data Center Core Options
Server farm Security
Need to Connect Data Centers
Server farm Interconnect Options
Expanding Layer 2 Between Data Centers
Supporting Server Scalability
Application-Level Load Balancing
System Level Load Balancing
Outline
Lesson 6: Module Summary
References
Lesson 7: Module Self-Check
Module 5: Design of Internal Routing and Connecting to the Internet
Lesson 1: Routing Protocol Considerations
Inside and Exterior Routing Protocols
Course Summarization
Beginning Default Routes
Course Redistribution
Keeping away from Transit Traffic
Protective Filtering
Utilize Cases for Passive Interfaces
Directing Protocol Fast Convergence
Conjunction of IPv4 and IPv6 IGP Routing
Directing Protocol Authentication
Outline
Lesson 2: Expanding EIGRP Design
Contextual investigation: Single-Homed Site
Contextual investigation: Dual-Homed Site
Contextual investigation: Geographic Dispersion of HQ
Contextual investigation: Stub Feature
Contextual investigation: Summarizing Towards the Core
Outline
Lesson 3: Expanding OSPF Design
Contextual investigation: OSPF Areas
Survey of OSPF LSAs
Contextual investigation: OSPF Summarization
Contextual investigation: OSPF Path Selection
Contextual investigation: OSPF Stubby Areas
Outline
Lesson 4: Introducing IS-IS
Presenting IS-IS
IS-IS Areas
Between Router Communication
CLNS Addressing
IS-IS Metric
IS-IS Load Balancing
IS-IS Authentication
Essential IS-IS Configuration
IS-IS for IPv6
Outline
Lesson 5: Expanding IS-IS Design
Region and Scaling
IS-IS Hub-and-Spoke Scaling
Contextual investigation: IS-IS Hub-and-Spoke
Outline
Lesson 6: Using BGP to Connect to the Internet
Contextual investigation: Single and Dual-Homing
Contextual investigation: Multihoming
Ramifications of Running Full BGP Routing Table
Running a Partial Internet Table
BGP Route Selection Process
Impacting Outbound and Inbound Routing
Impacting Outbound Routing: Weight Attribute
Impacting Outbound Routing: Local Preference
Impacting Inbound Routing: Setting MED Outbound
Impacting Inbound Routing: Setting Communities Outbound
Impacting Inbound and Outbound Routing: Prepending AS Path
Contextual investigation: Avoiding Loops When Forwarding to the Internet
Course Dampening
Concurrence of BGP for IPv4 and IPv6
Rundown
Lesson 7: Module Summary
References
Lesson 8: Module Self-Check
Module 6: Expanding the Existing Network
Lesson 1: Understanding Quality of Service
Movement Characteristics
Requirement for QoS
QoS Mechanisms Overview
Confide in Boundary
QoS Mechanisms ? Classification and Marking
Characterization Tools
QoS Mechanisms ? Policing, Shaping, and Re-Marking
Devices for Managing Congestion
Devices for Congestion Avoidance
QoS Deployment Principles
Prescribed Practice QoS Design Principles
Outline Strategies
Rundown
Lesson 2: Supporting Wireless Access
Prologue to Wireless LAN Networks
Self-sufficient WLAN Architecture
Concentrated WLAN Architecture
Strength WLAN Architecture: Wireless Bridge
Cloud-Enabled WLAN Architecture
LAN Bandwidth Considerations
Trunk and VLAN Configuration
WLAN and PoE
WLAN and End-to-End QoS
Supporting Wireless Security
Rundown
Lesson 3: Integrating Collaboration
Joint effort Overview
Joint effort Building Blocks
Supporting IP Telephony
Voice VLAN
Conventions of IP Telephony
Joint effort Traffic
Movement Patterns
Guaranteeing Good User Experience
Rundown
Lesson 4: Module Summary
References
Lesson 5: Module Self-Check
Module 7: IP Addressing Design
Lesson 1: Concepts of Good IP Addressing
IP Addressing Goals
Arranging IP Addressing
Arranging Addressing for the Future
Course Summarization with IPv4
Course Summarization with IPv6
Open and Private Addressing
Staying away from Re-Addressing
Synopsis
Lesson 2: Creating an Addressing Plan for IPv4
Arranging the IP Addressing Hierarchy
Making an Addressing Plan
Contextual analysis: IPv4 Address Space
Contextual analysis: Resolving Overlapping Address Ranges
Assigning More IP Addresses
Voice Overlay Subnets
Requirement for Loopbacks
Synopsis
Lesson 3: IPv6 Addressing
Advantages and Challenges of IPv6 Addressing
Structure of an IPv6 Address
IPv6 for an Enterprise
IPv6 Address Allocation: Linked IPv4 Into IPv6
IPv6 Address Allocation: Per Location/Type
Contextual analysis: Location-Based Subnetting
Contextual analysis: Type-Based Subnetting
IPv6 Address Allocation: Per VLAN
IPv4 and IPv6 Coexistence
Synopsis
Lesson 4: Supporting IP Addressing
IP Address Management
IPv4 Address Assignment Recommended Practices
IPv6 Address Assignment Recommended Practices
DNS Recommended Practices
Contextual analysis: DHCP and DNS Servers in a Network
Synopsis
Lesson 5: Module Summary
References
Lesson 6: Module Self-Check
Module 8: Introduction to Software Defined Networks
Lesson 1: SDN Overview
SDN Definition
Requirement for SDN
Way to Network Programmability
SDN Flavors
SDN Framework
SDN Controllers
Southbound APIs
Northbound APIs
OpenFlow
OpenDaylight
Cisco ACI
Rundown
Lesson 2: Module Self-Check
Labs Outline
Test 1: Ask the Right Questions
Get some information about Customer's Design Requests
Test 2: Design Branch's LAN
Make High-Level Design for Branch LAN
Decide Needed Configuration Changes
Make A Draft BOM
Test 3: Design Branch?s Connections to the HQ
Choosing Router for the Branch Office
Configuration Single-MPLS/VPN Connection to Branch
Outline Dual-MPLS/VPN Connection to Branch
Plan Primary MPLS/VPN and Secondary VPN over Internet
Test 4: Design Branch?s Routing
Enhance Scalability of Existing OSPF Design
Configuration Routing for Local Internet Connectivity for New Branch
Best Path Optimization
Test 5: Design Support for Wireless and Collaboration
Check That the Infrastructure Supports Collaboration and Wireless Designs
Help to Design QoS Policy for WAN Links
Test 6: Design IPv4 Addressing Plan
The information and abilities that a student must have before going to this course are as per the following:
Work LANs with various switches, design VLANs, trunking, crossing tree, DHCP, and port accumulation inside Campus arrange
Design and investigate IPv4 and IPv6 directing inside an Enterprise organize (static, EIGRP, multi-region OSPF, and RIPng)
Execute undertaking Internet network (static courses and essential BGP)
Execute course redistribution utilizing separating components
Execute way control utilizing approach based directing and IP SLA
Execute First Hop excess in IPv4 and IPv6 situations
Design gadgets for SNMP, Syslog, and NetFlow get to
Secure grounds organize as indicated by suggested rehearses