You are on page 1of 14

1.

Network Fundamentals
DAY 1:
What is CCNA?

Why to acquire a CCNA certification?

Types of CCNA certification

Understanding the Need for Networking.

What is a Network?

What is OSI Model ?

 Compare and contrast OSI and TCP/IP models


 Compare and contrast TCP and UDP protocols

Types of Network Devices.

 Switch
 Router
 Firewall

Describe the impact of infrastructure components in an enterprise network

 Firewalls
 Access points
 Wireless controllers

Describe the effects of cloud resources on enterprise network architecture

 Traffic path to internal and external cloud services


 Virtual services
 Basic virtual network infrastructure

Compare and contrast collapsed core and three-tier architectures

Compare and contrast network topologies

 Star
 Mesh
 Hybrid
Select the appropriate cabling type based on implementation requirements

Types Of cables & Connectivity.

DAY 2:

Apply troubleshooting methodologies to resolve problems

 Perform and document fault isolation


 Resolve or escalate
 Verify and monitor resolution

Configure, verify, and troubleshoot IPv4 addressing and subnetting

Compare and contrast IPv4 address types

 Unicast
 Broadcast
 Multicast

Describe the need for private IPv4 addressing

Classes of IPv4

Subnetting.

Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a


LAN/WAN environment

Configure, verify, and troubleshoot IPv6 addressing

Configure and verify IPv6 Stateless Address Auto Configuration

Compare and contrast IPv6 address types

 Global unicast
 Unique local
 Link local
 Multicast
 Modified EUI 64
 Autoconfiguration
 Anycast

PRACTICAL: Subnetting.

DAY 3:
2. LAN Switching Technologies
Describe and verify switching concepts

 MAC learning and aging


 Frame switching
 Frame flooding
 MAC address table

Interpret Ethernet frame format

Troubleshoot interface and cable issues (collisions, errors, duplex, speed)

Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple


switches

 Access ports (data and voice)


 Default VLAN

Configure, verify, and troubleshoot interswitch connectivity

 Trunk ports
 Add and remove VLANs on a trunk
 DTP, VTP (v1&v2), and 802.1Q
 Native VLAN

Configure, verify, and troubleshoot STP protocols

 STP mode (PVST+ and RPVST+)


 STP root bridge selection

Configure, verify and troubleshoot STP related optional features

 PortFast
 BPDU guard

Configure and verify Layer 2 protocols

 Cisco Discovery Protocol


 LLDP

Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel

 Static
 PAGP
 LACP
Describe the benefits of switch stacking and chassis aggregation

PRACTICAL: VLAN config

DAY 4:

3. Routing Technologies
Describe the routing concepts

 Packet handling along the path through a network


 Forwarding decision based on route lookup
 Frame rewrite

Interpret the components of a routing table

 Prefix
 Network mask
 Next hop
 Routing protocol code
 Administrative distance
 Metric
 Gateway of last resort

Describe how a routing table is populated by different routing information sources

 Admin distance

Configure, verify, and troubleshoot inter-VLAN routing

 Router on a stick
 SVI

DAY 5:

Describe static routing and dynamic routing.

Compare and contrast static routing and dynamic routing

Compare and contrast distance vector and link state routing protocols

Compare and contrast interior and exterior routing protocols

Configure, verify, and troubleshoot IPv4 and IPv6 static routing

 Default route
 Network route
 Host route
 Floating static

PRACTICAL : static routing & Default Routing.

DAY 6:

Describe RIP

Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering,
manual summarization, redistribution)

Troubleshoot basic Layer 3 end-to-end connectivity issues

PRACTICAL : RIP

Describe EIGRP

Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering,
manual summarization, redistribution, stub)

Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering,
manual summarization, redistribution, stub)

PRACTICAL : EIGRP

DAY 7:

Describe OSPF

Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4
(excluding authentication, filtering, manual summarization, redistribution, stub, virtual-
link, and LSAs)

Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6
(excluding authentication, filtering, manual summarization, redistribution, stub, virtual-
link, and LSAs)

PRACTICAL : OSPF

DAY 8:

Describe BGP

Configure, verify, and troubleshoot BGP.


PRACTICAL: BGP

DAY 9:

4. WAN Technologies
Describe PPP, PPPoE & GRE tunnel.

PPP and MLPPP on WAN interfaces using local authentication

PPPoE client-side interfaces using local authentication

Describe WAN topology options

 Point-to-point
 Hub and spoke
 Full mesh
 Single vs dual-homed

Describe WAN access connectivity options

 MPLS
 Metro Ethernet
 Broadband PPPoE
 nternet VPN (DMVPN, site-to-site VPN, client VPN)

Describe single-homed branch connectivity using eBGP IPv4 (limited to peering and
route advertisement using Network command only)

Describe basic QoS concepts

 Marking
 Device trust
 Prioritization
o [i] Voice
o [ii] Video
o [iii] Data
 Shaping
 Policing
 Congestion management

DAY 10:

5. Infrastructure Services
Describe DNS lookup operation

Troubleshoot client connectivity issues involving DNS

Configure and verify DHCP on a router (excluding static reservations)

o Server
o Relay
o Client
o TFTP, DNS, and gateway options

Troubleshoot client- and router-based DHCP connectivity issues

Configure, verify, and troubleshoot basic HSRP

o Priority
o Preemption
o Version

Configure, verify, and troubleshoot inside source NAT

o Static
o Pool
o PAT

Configure and verify NTP operating in a client/server mode

DAY 11:

Infrastructure Security
 Configure, verify, and troubleshoot port security
o Static
o Dynamic
o Sticky
o Max MAC addresses
o Violation actions
o Err-disable recovery

Describe common access layer threat mitigation techniques

o 802.1x
o DHCP snooping
o Nondefault native VLAN
Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering

o Standard
o Extended
o Named

Verify ACLs using the APIC-EM Path Trace ACL analysis tool

Configure, verify, and troubleshoot basic device hardening

o Local authentication
o Secure password
o Access to device
 . [i] Source address
 [ii] Telnet/SSH
o Login banner

Describe device security using AAA with TACACS+ and RADIUS

Static

 Pool
 PAT
 Configure and verify NTP operating in a client/server mode

PRACTICAL: ACL & NAT

DAY 12:

7. Infrastructure Management / Device Monitoring


Protocols.
Configure and verify device-monitoring protocols

 SNMPv2
 SNMPv3
 Syslog

Troubleshoot network connectivity issues using ICMP echo-based IP SLA

Configure and verify device management

 Backup and restore device configuration


 Using Cisco Discovery Protocol or LLDP for device discovery
 Licensing
 Logging
 Timezone
 Loopback

Configure and verify initial device configuration

Perform device maintenance

 Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify)
 Password recovery and configuration register
 File system management

Use Cisco IOS tools to troubleshoot and resolve problems

 Ping and traceroute with extended option


 Terminal monitor
 Log events
 Local SPAN

Describe network programmability in enterprise network architecture

 Function of a controller
 Separation of control plane and data plane

DAY 13

PRACTICAL WAY

 Real-time statistics on device CPU and Memory Utilization.


 Up-to-the-second information on any performance metric of a device.
 Real-time traffic/ Bandwidth utilization of an interface/ port.

Network performance monitoring

 Factors that impact network performance.

 Availability
 CPU and memory
 Traffic
 Errors and discards
 WAN performance 

Proactive network device monitoring


Network Uptime Monitor

Packet Loss Monitoring

Factors that can cause network packet loss

Packet loss can be caused by any or a combination of the following:

 Network Congestion
 Problems With Network Hardware
 Software Bugs
 Overloaded Devices
 Security Threats
 Faulty Configuration Changes

Interface Monitoring

Network Testing Tools

What are network testing tools?

Why are network testing tools important?

It is crucial to establish periodic network testing with reliable network testing tools
to:

 Understand the network's state


 Ensure the configuration changes work as expected
 Detect crippling network attacks
 Provide a top-notch end-user experience

DAY 14

What is Network Operations Center (NOC)?

What is the purpose of a NOC?

Network Operations Center Monitoring Tools -

Practical demo on various tools Solar winds, HPSM, ManageEngine, WhatsUp Gold

Challenges faced by an IT admin

Even in a relatively small networking environment :


 Network tests are grueling for a network admin as they demand a substantial
amount of resources and manual effort.
 If multiple networking testing tools are employed, the tools have to be launched
and stopped individually to perform each network test, which demands ample
time.
 The network testing tools require a certain level of management such as
allocating storage, clearing cache, starting and stopping necessary services, and
ensuring open ports. The management of multiple tools in itself becomes an
intimidating task.

Hardware monitor

Monitor hardware such as servers, routers, switches, firewalls, VMs and storage

devices and get real-time information on their status and availability.

 Temperature
 Fan Speed
 Power Supply
 Processor Clock Speed
 Battery
 Disk Array

==================================================================

DAY 15: Firewall

11.1 The Need for FW.

11.2 FW Characteristics.

11.2a Types of FW

• Packet Filtering
• Stateful Packet Inspection

• Application Level GW

• Circuit Level GW

DAY 16: Load Balancing

12.1 Basic Load Balancing Terminology.

Node, Host, Member & Server

Pool, Cluster & Farm

Virtual Server

12.2 Load Balancing Basics.

Load Balancing Decisions.

Load Balance or not to Load Balance.

DAY 17:

Cloud Topology & DNS in AWS.

1. Introduction to Cloud Computing

 Introduction – Component of CC – Comparing CC with Virtualization, Grids,


Utility Computing, clientserver model, P-to-P Computing – Impact of CC on
Business – Key Drivers for Cloud Computing - Cloud computing Service delivery
model
 Cloud Types – Private, Public and Hybrid, when to avoid public cloud, Cloud API

2. Virtualization

 Introduction & benefit of Virtualization , CPU, Memory and I/O Devices, Hardware
support for Virtualization in intel x86 processor – CPU Virtualization – Memory
Virtualization and I/O Virtualization – Virtualization in Multicore processors.

3. Cloud computing Services

 XaaS, IaaS, PaaS- Leveraging PaaS for Productivity- Languages for PaaS-
DBaaS(Database as a services) – SaaS (Software as a service) – Comparison of
various cloud computing providers/ Softwares
 DAY 18:

4. Cloud Computing and Business Value:

 Key Business Drivers for CC- Cloud computing and out sourcing – Types of
Scalability – Security issues in Cloud Computing- time to Market Benefits-
Distribution over Internet – Three levels of Business value from Cloud computing.

5. Open Source Cloud Implementation and Administration

 Eucalyptus and Open Stack Architecture Features – Components – Various


mode of operations – Installation and configuration process of both open source
– Cloud Administration and Management Task – Creating User Interface ( Web
Interface ) of Private cloud.

6. Cloud Deployment Techniques

 Factors for Successful Cloud Deployment – Network Requirements – Potential


Problem areas in a cloud Network and their Mitigation – Cloud Network
Topologies – Automation and Self-service feature in a cloud –cloud performance.

7. Security

 Security for Virtualization Platform – Host security for SaaS, PaaS and IaaS –
Data Security – Data Security Concerns – Data Confidentiality and Encryption –
Data Availability – Data Integrity – Cloud Storage Gateways – Cloud Firewall.

 DAY 19:

Voice Basics.
BASIC Overview of Voice.

 Course Introduction
 Options for a Study Lab
 PSTN Fundamentals
 Voice Over IP Fundamentals -
 Switched Network Design
 Switch Port Configuration for IP Telephony
 DAY 20: PRACTICAL & Revision DAY.

System and tools requirement:

Minimum System Requirements.

Item Requirement

 Operating System  Windows 7 (64 bit) or later

 Processor  2 or more Logical cores

 Memory  8 GB RAM

FREE TOOLS Requirement.

CCNA Packet Tracer

GNS3

Cisco IOS

HPSM, Manage Engine, Solarwind--- Monitoring Tools.

Azure / AWS

You might also like