جستجو برای "{{term}}"
جستجو برای "{{term}}" نتیجه ای نداشت.
پیشنهاد می شود:
  • از املای صحیح کلمات مطمئن شوید.
  • از کلمات کمتری استفاده کنید.
  • فقط کلمه کلیدی عبارت مورد نظر خود را جستجو کنید.
{{count()}} نتیجه پیدا شد. برای دیدن نتایج روی دکمه های زیر کلیک کنید!
نتیجه ای یافت نشد.
سایر نتیجه ها (دپارتمان ها، اخبار، مقالات، صفحات) را بررسی کنید.

{{item.title}}

{{item.caption}}
نتیجه ای یافت نشد.
سایر نتیجه ها (دوره ها، اخبار، مقالات، صفحات) را بررسی کنید.

{{item.title}}

{{item.caption}}
نتیجه ای یافت نشد.
سایر نتیجه ها (دوره ها، دپارتمان ها، مقالات، صفحات) را بررسی کنید.

{{item.title}}

{{item.caption}}
{{item.datetime}}
نتیجه ای یافت نشد.
سایر نتیجه ها (دوره ها، دپارتمان ها، اخبار، صفحات) را بررسی کنید.

{{item.title}}

{{item.caption}}
{{item.datetime}}
نتیجه ای یافت نشد.
سایر نتیجه ها (دوره ها، دپارتمان ها، اخبار، مقالات) را بررسی کنید.

{{item.title}}

{{item.caption}}
{{item.datetime}}

سرفصل ccnp

Network & Security

 

350-401 ENCOR

  Key Knowledge Areas The following is a partial list of the used files, terms and utilities:
Architecture :
  1. Explain the different design principles used in an enterprise network
  2. Analyze design principles of a WLAN deployment
  3. Differentiate between on-premises and cloud infrastructure deployments
  4. Explain the working principles of the Cisco SD-WAN solution
  5. Explain the working principles of the Cisco SD-Access solution
  6. Describe concepts of wired and wireless QoS
  7. Differentiate hardware and software switching mechanisms
  • Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
  • High availability techniques such as redundancy, FHRP, and SSO
  • Wireless deployment models (centralized, distributed, controller-less, controller based, cloud, remote branch)
  • Location services in a WLAN design
  • SD-WAN control and data planes elements
  • Traditional WAN and SD-WAN solutions
  • SD-Access control and data planes elements
  • Traditional campus interoperating with SD-Access
  • QoS components
  • QoS policy
  • Process and CEF
  • MAC address table and TCAM
  • FIB vs. RIB
Virtualization :
  1. Describe device virtualization technologies
  2. 2.2 Configure and verify data path virtualization technologies
  3. 2.3 Describe network virtualization concepts
  • Hypervisor type 1 and 2
  • Virtual machine
  • Virtual switching
  • VRF
  • GRE and IPsec tunneling
  • LISP
  • VXLAN
Infrastructure :
  1. Layer 2
  2. Layer 3
  3. Wireless
  4. IP Services
  • Troubleshoot static and dynamic 802.1q trunking protocols
  • Troubleshoot static and dynamic EtherChannels
  • Configure and verify common Spanning Tree Protocols (RSTP and MST)
  • Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)
  • Configure and verify simple OSPF environments, including multiple normal areas, summarization, and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface)
  • Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships)
  • Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client devices capabilities
  • Describe AP modes and antenna types
  • Describe access point discovery and join process (discovery algorithms, WLC selection process)
  • Describe the main principles and use cases for Layer 2 and Layer 3 roaming
  • Troubleshoot WLAN configuration and wireless client connectivity issues
  • Describe Network Time Protocol (NTP)
  • Configure and verify NAT/PAT
  • Configure first hop redundancy protocols, such as HSRP and VRRP
  • Describe multicast protocols, such as PIM and IGMP v2/v3
Network Assurance:
  1. Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog
  • Configure and verify device monitoring using syslog for remote logging
  • Configure and verify NetFlow and Flexible NetFlow
  • Configure and verify SPAN/RSPAN/ERSPAN
  • Configure and verify IPSLA
  • Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management
  • Configure and verify NETCONF and RESTCONF
Security:
  1. Configure and verify device access control
  2. Configure and verify infrastructure security features
  3. Describe REST API security
  4. Configure and verify wireless security features
  5. Describe the components of network security design
  • Lines and password protection
  • Authentication and authorization using AAA
  • ACLs
  • CoPP
  • EAP
  • WebAuth
  • PSK
  • Threat defense
  • Endpoint security
  • Next-generation firewall
  • TrustSec, MACsec
  • Network access control with 802.1X, MAB, and WebAuth
Automation:
  1. Interpret basic Python components and scripts
  2. Construct valid JSON encoded file
  3. Describe the high-level principles and benefits of a data modeling language, such as YANG
  4. Describe APIs for Cisco DNA Center and vManage
  5.  
  6. Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF
  7. Construct EEM applet to automate configuration, troubleshooting, or data collection
  8. Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack
 

300-410 ENARSI (80hrs)

  Key Knowledge Areas: The following is a partial list of the used files, terms and utilities:
Advance Layer 3 Technologies:
  1. Troubleshoot administrative distance (all routing protocols)
  2. Troubleshoot route map for any routing protocol (attributes, tagging, filtering)
  3. Troubleshoot loop prevention mechanisms (filtering, tagging, split horizon, route poisoning)
  4. Troubleshoot redistribution between any routing protocols or routing sources
  5. Troubleshoot manual and auto-summarization with any routing protocol
  6. Configure and verify policy-based routing
  7. Configure and verify VRF-Lite
  8. Describe Bidirectional Forwarding Detection
  9. Troubleshoot EIGRP (classic and named mode)
  10. Troubleshoot OSPF (v2/v3)
  11. Troubleshoot BGP (Internal and External)
  • Address families (IPv4, IPv6)
  • Neighbor relationship and authentication
  • Loop-free path selections (RD, FD, FC, successor, feasible successor, stuck in active)
  • Stubs
  • Load balancing (equal and unequal cost)
  • Metrics
  • Address families (IPv4, IPv6)
  • Neighbor relationship and authentication
  • Network types, area types, and router types
  • Point-to-point, multipoint, broadcast, nonbroadcast
  • Area type: backbone, normal, transit, stub, NSSA, totally stub
  • Internal router, backbone router, ABR, ASBR
  • Virtual link
  • Path preference
  • Address families (IPv4, IPv6)
  • Neighbor relationship and authentication (next-hop, mulithop, 4-byte AS, private AS, route refresh, synchronization, operation, peer group, states and timers)
  • Path preference (attributes and best-path)
  • Route reflector (excluding multiple route reflectors, confederations, dynamic peer)
  • Policies (inbound/outbound filtering, path manipulation)
VPN Technologies:
  1. Describe MPLS operations (LSR, LDP, label switching, LSP)
  2. Describe MPLS Layer 3 VPN
  3. Configure and verify DMVPN (single hub)
  • GRE/mGRE
  • NHRP
  • IPsec
  • Dynamic neighbor
  • Spoke-to-spoke
Infrastructure Security:
  1. Troubleshoot device security using IOS AAA (TACACS+, RADIUS, local database)
  2. Troubleshoot router security features
  3. Troubleshoot control plane policing (CoPP) (Telnet, SSH, HTTP(S), SNMP, EIGRP, OSPF, BGP)
  4. Describe IPv6 First Hop security features (RA guard, DHCP guard, binding table, ND inspection/snooping, source guard)
  • IPv4 access control lists (standard, extended, time-based)
  • IPv6 traffic filter
  • Unicast reverse path forwarding (uRPF)
Infrastructure Services:
  1. Troubleshoot device management
  2. Troubleshoot SNMP (v2c, v3)
  3. Troubleshoot network problems using logging (local, syslog, debugs, conditional debugs, timestamps)
  4. Troubleshoot IPv4 and IPv6 DHCP (DHCP client, IOS DHCP server, DHCP relay, DHCP options)
  5. Troubleshoot network performance issues using IP SLA (jitter, tracking objects, delay, connectivity)
  6. Troubleshoot NetFlow (v5, v9, flexible NetFlow)
  7. Troubleshoot network problems using Cisco DNA Center assurance (connectivity, monitoring, device health, network health)
  • Console and VTY
  • Telnet, HTTP, HTTPS, SSH, SCP
  • (T)FTP