Professional Documents
Culture Documents
Home Project
Cluster A
CCNP
Date: 4-28-2018
Evaluation guidelines:
You will be asked to take your client’s requirements,
review them and provide the network design and
topology. You will be asked to test the solution,
validate the solution, and prepare for the
installation and verification of the proposed
solution.
If an issue arose, how would you go about
troubleshooting it and applying the necessary fix?
NETWORK DESIGN Materials allowed:
Anything you need.
AND CONCEPTS
Comments:
Cluster A: Network Design and Concepts
As a consultant for Greenfield Enterprise, you have been asked to design their network, including:
1) Main Datacenter
3) WAN Design
8) Security Considerations
Requirements:
- All servers are located in the main datacenter and any changes on them has to be replicated on
the DA datacenter
- A complete network core needed ( Core, Distribution, Access)
- A redundant solution is mandatory between the two datacenters.
- Partners and Clients are connected to Greenfield Enterprise via a redundant and different
solution.
- Connection between Champlain’s and Greenfield Enterprise’s datacenters is restricted.
- All network devices are Cisco-based.
The client needs at least two solutions from you as indicated below:
Candidate’s answers:
I understand that the client wants a redundant Datacenter design, will the enterprise own the core
infrastructure, or will a provider offer connectivity services? Which WAN transport will be used between the
Datacenters? Dark Fibre, L2 service provider? L3 service provider? What are the distances to remote sites?
Will the network provide VOIP/Video? --- voice traffic has stringent QoS requirements. If user PCs and IP
phones are on the same VLAN, each tries to use the available bandwidth without considering the other
device. To avoid this conflict, it is good practice to use separate VLANs for IP telephony and data traffic.
The client is requesting WAN Design, which WAN transport technology will be used? Public internet based?
Private WAN based? Is the location of the network in a major city where there is more WAN transport
options, or is the location a rural area with a limited availability of WAN service options.
Candidate’s answer:
The request would be clearer if the organization’s
Greenfield Enterprise will own the core infrastructure, the First Cisco Data Center Interconnect Solution will
be Cisco DCI LAN Extension over Dark Fiber WAN:
The Second Cisco Data Center Interconnect Solution will be Cisco DCI LAN Extension over MPLS:
Comments:
Candidate’s answers:
Ref: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6800-series-switches/guide-c07-
733457.html
https://www.cisco.com/c/dam/en/us/solutions/collateral/data-center-virtualization/data-center-
interconnect/at_a_glance_c45-493703.pdf
3. What tools and software would you use to design the network topology?
Candidate’s answers:
OmniGraffle:
https://www.omnigroup.com/omnigraffle
Alternatives:
LanFlow:
http://www.pacestar.com/lanflow/index.html
CADE:
http://www.weresc.com/home.php
ConceptDraw:
http://www.conceptdraw.com/products/drawing-tool/
Diagram Designer:
http://logicnet.dk/DiagramDesigner/
Comments:
1. What is your approach to test the design before presenting it to the client?
Candidate’s answers:
Figure out what the network is required to do, identify network application and services
and then figure out how to test them.
Develop a plan for determining whether the network does what it is required to do.
Mimic end-user activities, and some of the network applications and services.
Figure out the needed models, tools, and processes to help them do the testing
efficiently.
Candidate’s answers:
Present micro macro documents, architecture document to show then what you have done.
Print off all the configs, present them in a nice logical way.
Validate the Network Topology Solution by going over the hierarchical design structure of the network.
Point out the good security practice of separating management and user data traffic with VLANS.
Discuss the choice to use Dark Fiber with Layer 2 transport which supports native Ethernet, IP, and MPLS
encapsulations.
1. What are the required steps to physically install all devices on the chosen design?
Candidate’s answers:
Find out what IOS rev makes the most sense based on what features I need.
Find out what I am licensed for, and what level of reliability is required (i.e. can I only run “General
Deployment” code, or am I willing to run a “technology” train because it has some new feature I need).
Check if the device is a stackable switch make sure it is all stacked together the way you want it stacked
with the correct device the command switch (check your priority settings).
Max points for BJ2J-2a: 10% Candidate’s points:
5. Prepare for
the Standard Standard Needs Total Score
installation Very good
exceeded met improvement
1. What approach, tools, etc. will you use to validate the physical installation?
Candidate’s answers:
Check that Chassis is securely mounted and grounded.
Check cable management (if the cables were configured in a tear drop shape).
VTP VLAN
VLAN TOPOLOGY
Check that the external CompactFlash memory card is properly seated into its slot
Check that PC with terminal emulation program (HyperTerminal or equivalent) is connected to the console
port and configured for 9600 baud, 8 data bits, 1 stop bit, no parity, and flow control is set to “none.”
Check that Suitable PC COM port is selected in the terminal emulation program.
Check that IP addresses for the Ethernet and serial interfaces have been determined.
Candidate’s answers:
Candidate’s answers:
Identify the features you need to configure on each device.
Identify various sites in the network and the different configurations that could be required in different
sites.
While planning configuration design, consider what relevant information you want to monitor.
Identify the size of the network and how diverse the devices are and the services it will support.
Create all the necessary documentation, including procedures, scripts and templates.
Comments:
Configuration and design can be also be tested in a pilot network, by rolling out a small group of real users
with real equipment and monitor how everything works.
Verify that both configuration and design meet the client’s requirements by going over documented physical
topology diagrams, audit results, network health analysis.
8. Verify the
network. Standard Standard Needs Total Score
Very good
exceeded met improvement
1) In case that the client reported an issue, what would your approach be to find out its root cause?
2) How would you narrow down the issue?
Candidate’s answers:
1.
Consult the OSI model:
Layer 2 – traffic passed? Errors on port? Show dynamic cam, show cam
Layer 4 – is the vlan properly routed? Can ping on same subnet? Different subnet?
2.
By doing structured troubleshooting, a systematic elimination of hypothetical causes narrowing down on the
possible issue. By reducing the scope, problem is eventually isolated and then a best solution can be
implemented.
1. How would you determine what the best solution is to resolve the current issue?
Candidate’s answers:
Work through the OSI model using the Bottom up approach through the layers on the source and bottom up
on the destination. Start from the OSI physical layer and move up toward the application layer. Once you
isolate and identify the problem, you can start looking at the possible solutions. You then determine the best
solution, if critical busininess is dependent on it then a fast solution needs to be implemented temporarily
until a permanent solution can be figured out.
Plan out how you will carry out the solution, make sure everone on the team knws what they should be doing.
Backup all the current configs, transfer then onto a usb or a TFTP Server, document the cabling configuration.
Have a defined process in place, have a channel for communication both internally and externally. Take a
snapshot of the current state of the network and formulate a backup procedure in case things go wrong while
applying the solution. Produce clear diagrams to view the before and after changes.
2) In order to prevent similar issues from happening, network verification technology can be adopted to
peform proactive verification. Scripts can be used to automatically check the network. Stay ahead of
potential hardware problems by regularely reviewing IT infrastructure. Monitor for uncommon
traffic, CPU spikes or brute-force login attempts. Monitor cooling equipment and other
environmental values to ensure your devices remain safe and avoid major outage.
1) How would you document the project during its different phases?
2) What is your proposal to have a consistent documentation for all parties after the end of the
project?
Candidate’s answers:
1) Document every phone call, every meeting and keep the project well organized from day one with
copies of all correspondence.
During every conversation, by phone or in person, notes should be entere into a log book indicating
such things as date, time, persons involved, topics of conversation, and required follow-up. Email
messages should be printed and filed. Meetings should be documented in a similar fashion.
Document the IP addressing scheme and VLANs.
Document the configs and have them ready to show the client.
Create L1/L2 drawing of the physical connectivity and layout of your network, use CDP to help you
create L1/L2 network drawing.
Create L3 drawings that include every device that is involved with routing in your network.
Have an inventory list which includes manufacturer, model, serial number, hostname, location, and
closet (if more than one).