.
سرفصل ها
Part one: Cisco SDA fundamentals
Describe Cisco SD-Access architecture and its components
Explain Catalyst Center deployment models, scaling, and high availability
Identify Cisco SD-Access fabric protocols and node roles
Understand the Cisco SD-Access Wireless deployment models
Automate Day 0 device onboarding with Catalyst Center LAN Automation and Network PnP
Deploy simple Cisco SD-Access fabric networks
Monitor health and performance of the network with Catalyst Center Assurance
Interact with the Catalyst Center Platform Intent APIs
LAB OUTLine:
Explore Catalyst Center User Interface
Verify Location Identifier Separation Protocol (LISP) Operation in Cisco SD-Access
Integrate Catalyst Center and Cisco Identity Services Engine (Cisco ISE) [Simulation]
Bringing up fabric !
Provision Underlay Networks with Catalyst Center LAN Automation [Simulation]
Provision Underlay Networks with Catalyst Center LAN Automation (cont.)
Deploy Cisco SD-Access Single Site Fabric [Simulation]
Deploy Cisco SD-Access Single Site Fabric (cont.)
Explore Catalyst Center Assurance [Simulation]
Cisco DNA Assurance Issues and Guided Remediation [Simulation]
Part Two: Cisco SISE
1 Basic Intro
1.1 Configure personas
1.2 Describe deployment options
1.3 Describe hardware and virtual machine performance specifications
1.4 Describe zero-touch provisioning
2 policy enforcement
2.1 Configure native AD and LDAP
2.2 Describe identity store options
2.2.a LDAP
2.2.b AD
2.2.c PKI
2.2.d Multifactor authentication
2.2.e Local
2.2.f SAML IDP
2.2.g Rest ID
2.3 Configure network access using 802.1X
2.4 Configure wired network access using 802.1X and IBNS 2.0
2.4.a Monitor mode
2.4.b Low impact
2.4.c Closed mode
2.5 Implement MAB
2.6 Configure Cisco TrustSec
2.7 Configure policies including authentication and authorization profiles
3 guest and web
3.1 Configure web authentication
3.2 Configure guest access services
3.3 Configure sponsor and guest portals
4 BYOD
4.1 Describe Cisco BYOD functionality
5.1.a Use cases and requirements
5.1.b Solution components
5.1.c BYOD flow
5 Device Administration
5.1Compare AAA protocols
5.2 Configure TACACS+ device administration and command authorization
Part three: ENAUTO
1 Network programming foundation
1.1 Utilize common version control operations with git (add, clone, push, commit, diff, branching, merging conflict)
1.2 Describe characteristics of API styles (REST and RPC)
1.3 Describe the challenges encountered and patterns used when consuming APIs synchronously and asynchronously
1.4 Interpret Python scripts containing data types, functions, classes, conditions, and looping
1.5 Describe the benefits of Python virtual environments
1.6 Explain the benefits of using network configuration tools such as Ansible and Terraform for automating IOS XE platforms
2 IBN Intent based networking
3 AutoPilot 101: Navigating the Basics of Automation
4 Code Harmony: Unifying JSON, XML & YANG for Seamless Data Integration
4.1 Identify the JSON instance based on a YANG model (including YANG Suite)
4.2 Identify the XML instance based on a YANG model (including YANG Suite)
4.3 Interpret a YANG module tree generated per RFC8340
4.4 Compare functionality, benefits, and uses of OpenConfig, IETF, and native YANG models
4.5 Compare functionality, benefits, and uses of NETCONF and RESTCONF
5 Automation Alchemy Lab: Mastering Python, Ansible & NORNIR for Network Magic
All hands on labs!!!
Network Command Hub: Orchestrating Cisco Catalyst, DNA, and SD-WAN
6.1 Compare traditional versus software-defined networks
6.2 Describe the features and capabilities of Cisco DNA Center
6.2.a Network assurance APIs
6.2.b Intent APIs
6.2.c Events and notifications
6.2.d SDA
6.3Describe features and capabilities of Cisco SD-WAN vManage APIs
6.4 Implement a Python script to perform API requests for Cisco SD-WAN vManage Device Inventory APIs to retrieve and display data
6.5 Construct API requests for Cisco SD-WAN vManage Administration
به عنوان اولین نفر، نظر خود را بنویسید!