You are on page 1of 20

Cisco Network Engineer

Overview
This course is designed for freshers who wish to start their career in Networking. The course starts with some
of the basics and lay a strong foundation. The training plan covers advanced routing and switching with focus
on OSPF, EIGRP, BGP and route redistribution. The training also covers the SDWAN, Wireless, Network
Security, QOS and F5 loab balancers so as to prepare candidates to handle such technologies in a day-to-day
network activities.

The training balances between the theoretical and practical sessions ver well. The hands-on labs makes the
learning effective and retainable.

Prerequisite
Basic Computer Literacy

Pretest covering all the modules.

Module 1: Network Basics (Day 1)

Introduction to Networking
Types of Network
Network Topologies
Types of communication (Unicast, Multicast, Broadcast)
Ethernet basics (CSMA/CD, CSMA/CA, Hubs, Switches)
Explain the role and function of network components

● Routers
● Layer 2 and Layer 3 switches
● Next-generation firewalls and IPS
● Access points
● Endpoints
● Servers

Compare physical interface and cabling types

Module 2: TCP/IP and Network Models (Day 1 and 2)

● IP addressing and binary


● Subnetting, VLSM, FLSM,CIDR
● OSI Model
● TCP/IP Model
● TCP vs UDP
● ARP, DHCP and DNS
● Ping, Traceroute

Lab/Activity Outiline
Activity 1: Subnetting Class C
Activity 2: Subnetting Class B
Activity 3: Subnetting Class A
Activity4: VLSM
Lab 1: Configuring DHCP and DNS services on Cisco router.
Lab 2: Checking the output of Ping and traceroute
Lab 3: Installing wireshark
Lab 4: Inspecting packets using wireshark.
Lab 5: Checking 3-way handshake in wireshark

Live Quiz

Module 3: Introduction to Cisco IOS (Day 3)

● Logging in to the Cisco Router/Switch


● Getting help
● Understanding IOS modes
● Setting up hostnames
● Setting up line passwords
● Setting up the secret
● Configuring Telnet/SSH
● Saving the configuration
● Setting up the Serial and Ethernet interfaces

Lab Outlines
● Lab 1: Get Started with Cisco Command-Line Interface (CLI)
● Lab 2: Configure hostnames, line passwords
● Lab 3: Setup enable password and enable secret
● Lab 4: Configure an Interface on a Cisco Router
● Lab 5: Configure and Verify Layer 2 Discovery Protocols
● Lab 6: Implement an Initial Router Configuration
● Lab 7: Configure Default Gateway

Live Quiz

Module 4: Switching (Day 4-6)


Describe switching concepts

● MAC learning and aging


● Frame switching
● Frame flooding
● MAC address table

Configure and verify VLANs (normal range) spanning multiple switches

● Access ports (data and voice)


● Default VLAN
● InterVLAN connectivity

Configure and verify interswitch connectivity


● Trunk ports
● 802.1Q
● Native VLAN

Inter Vlan routing using Router on a stick and a Layer 3 Switch

Configure and verify (Layer 2/Layer 3) EtherChannel (LACP/Pagp)

Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic
operations

● Root port, root bridge (primary/secondary), and other port names


● Port states (forwarding/blocking)
● STP enhancements and security (portfast, bpduguard, rootguard, bpdufilter)

Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)

Lab Outline

● Lab 1: Implement the Initial Switch Configuration


● Lab 2: Observe How a Switch Operates
● Lab 3: Investigate the CAM
● Lab 4: Perform Basic Switch Configuration
● Lab 5: Configure VLAN and Trunk
● Lab 6: Troubleshoot VLANs and Trunk
● Lab 7: Configure a Router on a Stick
● Lab 8: Implement Multiple VLANs and Basic Routing Between the VLANs
● Lab 9: Tuning Spanning Tree Protocol (STP) and Configuring Rapid Spanning Tree Protocol (RSTP)
● Lab 10: Configure Multiple Spanning Tree Protocol
● Lab 11: Troubleshoot EtherChannel
● Lab 12: Troubleshoot Switch Media and Port Issues
● Lab 13: Troubleshoot Port Duplex Issues

Case Study: VLANs and STP in a Corporate Network

ABC Corporation is a medium-sized company that operates in several countries. The company has several
departments, including finance, marketing, IT, and operations, each with its own network needs. To manage
the network effectively, ABC Corporation decides to implement VLANs and STP.

VLAN Implementation:

ABC Corporation decides to implement VLANs to segregate network traffic and improve network security. They
plan to create VLANs for each department and assign network devices, such as switches, servers, and
computers, to their respective VLANs. The IT department also plans to create a VLAN for network
management.

To implement VLANs, ABC Corporation follows these steps:

1. Configure the Switches: The IT department configures the switches to support VLANs. They create the
VLANs and assign them to the appropriate switch ports. They also configure the trunk ports to allow
traffic between the VLANs.
2. Assign Devices to VLANs: The IT department assigns network devices to their respective VLANs based
on their department. They also assign the network management devices to the management VLAN.
3. Configure VLAN Interfaces: The IT department configures VLAN interfaces on the switches to allow
routing between the VLANs.
4. Test the VLANs: The IT department tests the VLANs to ensure that network traffic is segregated
correctly.

STP Implementation:

ABC Corporation also decides to implement STP to prevent network loops and improve network reliability.
They plan to configure all the switches as STP bridges and use the root bridge election process to ensure that
one switch is designated as the root bridge.

To implement STP, ABC Corporation follows these steps:

1. Enable STP on the Switches: The IT department enables STP on all the switches by configuring the
spanning-tree protocol.
2. Configure the Root Bridge: The IT department configures the root bridge by setting the priority of one
switch to the lowest value. This ensures that the switch is elected as the root bridge.
3. Verify the Root Bridge: The IT department verifies that the correct switch is elected as the root bridge.
4. Monitor the Network: The IT department monitors the network to ensure that the STP protocol is
preventing network loops and improving network reliability.

Benefits of VLANs and STP:

By implementing VLANs and STP, ABC Corporation benefits from the following:

1. Improved Network Security: VLANs help to segregate network traffic and improve network security by
preventing unauthorized access to sensitive data.
2. Network Scalability: VLANs enable ABC Corporation to scale the network easily by adding or removing
network devices as required.
3. Network Reliability: STP improves network reliability by preventing network loops and ensuring that
traffic flows efficiently.
4. Efficient Network Management: The management VLAN allows the IT department to manage the
network devices efficiently, improving network management.

Conclusion:

In conclusion, ABC Corporation's implementation of VLANs and STP has improved network security, scalability,
reliability, and management. By following the best practices for implementing VLANs and STP, ABC Corporation
has created a robust network infrastructure that supports the needs of the company's various departments.

Live Quiz

Module 5: Routing (Day 7-12)

Routing fundamentals
Interpret the components of routing table

● Routing protocol code


● Prefix
● Network mask
● Next hop
● Administrative distance
● Metric
● Gateway of last resort

Determine how a router makes a forwarding decision by default


● Longest match
● Administrative distance
● Routing protocol metric

Configure and verify IPv4 static routing

● Network route
● Default route
● Host route
● Floating static

Configure and verify single area and multiarea OSPFv2

● Neighbor adjacencies
● Point-to-point
● Broadcast (DR/BDR selection)
● Router ID
● OSPF Packet types
● OSPF Tables
● ABR and ASBR
● Summarization
● OSPF Authentication
● Route filteration

Configure and verify EIGRP

● Understanding EIGRP
● K-Values
● EIGRP packets
● EIGRP Tables
● Summarization and Load balancing
● Authentication
● Route filteration
● Successor/ Feasible Successor
● Feasible Distanceand Reported Distance

Route redistribution

Lab outline

● Lab 1: Configure and Verify IPv4 Static Routes


● Lab 2: Configure floating statis routes
● Lab 3: Configure and Verify Single-Area OSPF
● Lab 4: Implement Multi-area OSPF
● Lab 5: Implement OSPF Tuning
● Lab 6: Verify the Link-State Database
● Lab 7: Configure OSPF Stub Areas and Summarization
● Lab 8: Configure OSPF Authentication
● Lab 9: Troubleshoot OSPF
● Lab 10: Configure EIGRP Using Classic Mode and Named Mode for IPv4 and IPv6
● Lab 11: Verify the EIGRP Topology Table
● Lab 12: Configure EIGRP Stub Routing, Summarization, and Default Routing
● Lab 13: Configure EIGRP Load Balancing and Authentication
● Lab 14: Troubleshoot EIGRP Issues
● Lab 15: Implement Routing Protocol Redistribution
● Lab 16: Manipulate Redistribution
● Lab 17: Manipulate Redistribution Using Route Maps
● Lab 18: Troubleshoot Redistribution Issues

Case study on EIGRP:

Case Study: Implementing EIGRP for a Large Enterprise Network

A large enterprise network with multiple locations and a variety of network equipment was experiencing
significant routing issues. The network relied on static routing and OSPF, but the IT team was finding it
increasingly difficult to manage the routing tables and ensure optimal path selection. Additionally, the network
was expanding rapidly, with new locations being added frequently, making the management of the network
even more complex.

After conducting a thorough evaluation of the network, the IT team decided to implement EIGRP as the
primary routing protocol. EIGRP is a Cisco proprietary protocol that provides advanced routing features,
including fast convergence, load balancing, and automatic summarization.

The implementation of EIGRP involved several steps:

1. Configuration of EIGRP on all routers: The IT team configured EIGRP on all routers in the network. This
involved setting up the AS (autonomous system) number, configuring the network statements to
define which interfaces are participating in EIGRP, and configuring the passive-interface command on
interfaces that do not need to participate in EIGRP.
2. Optimization of the EIGRP configuration: The IT team optimized the EIGRP configuration by adjusting
the K-values to prioritize the metrics that were most important for the network. They also adjusted
the hello and hold timers to reduce the convergence time.
3. Implementation of summarization: The IT team implemented automatic summarization to reduce the
size of the routing table and improve network efficiency. This involved configuring summary routes on
routers at the edge of the network.
4. Load balancing: The IT team configured load balancing to optimize traffic flow across multiple paths.
This involved configuring equal-cost load balancing and variance to allow traffic to be distributed
across paths with different metrics.
5. Testing and verification: The IT team performed extensive testing and verification of the EIGRP
configuration to ensure that it was working correctly. They used various tools to monitor the network,
including the Cisco Network Assistant and the Cisco IOS show commands.

The implementation of EIGRP was a success, and the network experienced significant improvements in routing
stability, scalability, and manageability. The IT team was able to reduce the size of the routing table, improve
network efficiency, and ensure optimal path selection, resulting in faster network performance and improved
user experience.

Overall, the implementation of EIGRP was a valuable solution for this large enterprise network, and it serves as
an example of how the use of advanced routing protocols can enhance network performance and scalability.

Case Study on OSPF

Company XYZ is a large enterprise that provides IT services to its clients. They have multiple locations spread
across the country and use a complex network infrastructure to connect their various offices. To manage this
network, they use the Open Shortest Path First (OSPF) routing protocol.

The network consists of several routers, switches, and firewalls, which are connected to each other through
various interfaces. Each location has its own set of routers and switches, which are connected to a central
router. The central router acts as the backbone of the network and connects all the locations together.
To implement OSPF, the network administrator at Company XYZ first configured the routers to run OSPF and
then defined the areas for each location. The central router was configured as the area border router (ABR)
and was responsible for connecting the different areas together.

The OSPF protocol automatically discovered the network topology and created a routing table for each router.
This routing table contained information about all the networks and devices in the network, as well as the
shortest path to reach them.

The OSPF protocol also provided several benefits to Company XYZ's network. It allowed for faster convergence
times, reduced network traffic, and improved network scalability. The network administrator could easily add
new devices to the network without having to manually configure routing tables for each device.

In addition, OSPF provided advanced features such as load balancing and path prioritization, which allowed
Company XYZ to optimize their network traffic and ensure that critical applications had the necessary
bandwidth.

Overall, OSPF proved to be a reliable and efficient routing protocol for Company XYZ's complex network
infrastructure. Its flexibility and advanced features allowed the network to scale easily and meet the evolving
needs of the business.

Live Quiz
Module 6: Network Security Fundamentals (Day 13-14)

● Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
● Describe security program elements (user awareness, training, and physical access control)
Configure device access control using local passwords
● Describe and configure security password policies elements, such as management, complexity, and
password alternatives (multifactor authentication, certificates, and biometrics)
● Describe remote access and site-to-site VPNs
● Configure and verify access control lists
● Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security

Lab outline

● Lab 1: Configure and Verify IPv4 ACLs


● Lab 2: Implement Numbered and Named IPv4 ACLs
● Lab 3: Secure Console and Remote Access
● Lab 4: Configure and Verify Port Security
● Lab 5: Configuring ssh

Case Study:

ABC Inc. is a medium-sized organization with around 200 employees. The company has various departments
such as sales, marketing, HR, finance, and IT. The IT department is responsible for managing the company's IT
infrastructure, which includes servers, network devices, and other IT resources.

To secure their network infrastructure, the IT department has implemented access control lists (ACLs) and SSH
(Secure Shell) protocols.

Access Control Lists:

ABC Inc. uses ACLs to control access to its network devices, such as routers and switches. The ACLs are
implemented on the network devices to restrict access to specific IP addresses or networks.
For example, the IT department has created an ACL that only allows access to the management interface of
the routers and switches from specific IP addresses of the IT staff. This ensures that only authorized personnel
can access the network devices and configure them.

The IT department has also implemented ACLs on the firewall to restrict access to certain services and
protocols. For example, the IT department has created an ACL that only allows access to the company's email
server from the internal network and blocks access from the internet.

Secure Shell (SSH):

ABC Inc. uses SSH to secure remote access to its network devices. SSH is a secure protocol that encrypts all
traffic between the client and the server, ensuring that data cannot be intercepted or tampered with.

The IT department has implemented SSH on all network devices, including servers, routers, and switches. To
access the network devices remotely, authorized IT staff use SSH clients, such as PuTTY or OpenSSH, to
establish a secure connection.

The IT department has also disabled Telnet, an insecure protocol that sends all data in plain text, on all
network devices. This ensures that only secure protocols, such as SSH, are used to access the network devices.

Conclusion:

By implementing ACLs and SSH protocols, ABC Inc. has significantly improved the security of its network
infrastructure. The ACLs restrict access to the network devices, ensuring that only authorized personnel can
configure them. The use of SSH ensures that all remote access to the network devices is secure and encrypted.
Overall, ABC Inc. has taken important steps to secure its network infrastructure and protect against
unauthorized access and attacks.

Live Quiz

Module 7: Network Services (Day 15 - 16)

● Describe and configure the purpose of first hop redundancy protocol (HSRP/VRRP/GLBP)
● Configure and verify inside source NAT using static and pools
● Configure and verify NTP operating in a client and server mode
● Explain the role of DHCP and DNS within the network
● Explain the function of SNMP in network operations
● Describe the use of syslog features including facilities and levels
● Configure and verify DHCP client and relay
● Password recovery and Backup

Lab outline

● Lab 1: Configuring HSRP VRRP and GLBP (Groups, Authentication, Preempt)


● Lab 2: Configure Static NAT
● Lab 3: Configure Dynamic NAT and Port Address Translation (PAT)
● Lab 4: Implement PAT
● Lab 5: Configure and Verify NTP
● Lab 6: Configure System Message Logging
● Lab 7: Create the Cisco IOS Image Backup
● Lab 8: Upgrade Cisco IOS Image

Case Study: FHRP and NAT in a Small Business Network


Introduction:

A small business network needs to ensure high availability and security of its network resources. To achieve
this, it is essential to implement technologies such as FHRP and NAT. FHRP (First Hop Redundancy Protocol)
provides a mechanism for routers to share the same virtual IP address, enabling redundancy and load
balancing. NAT (Network Address Translation) provides a method for a network to use private IP addresses
internally while appearing as a public IP address externally.

Scenario:

A small business network with ten employees wants to implement FHRP and NAT to improve the availability
and security of their network resources. The network consists of a single router, which connects to the internet
through a broadband connection. The router has two interfaces, one connected to the local network and the
other connected to the internet.

Implementation:

FHRP:

The small business network can implement FHRP using either HSRP (Hot Standby Router Protocol) or VRRP
(Virtual Router Redundancy Protocol). In this case, HSRP is chosen to provide redundancy and load balancing.
HSRP enables the use of a virtual IP address that multiple routers share, allowing the network to continue
operating even if one of the routers fails.

The HSRP configuration is as follows:

1. Configure the HSRP virtual IP address: 192.168.1.1


2. Configure the HSRP priority: Router A (primary) = 110, Router B (backup) = 100
3. Configure the HSRP authentication: using MD5 hash

NAT:

The small business network can implement NAT to provide security and privacy by translating the private IP
addresses used on the internal network into a public IP address. NAT enables the network to use private IP
addresses internally, which are not accessible from the internet, while presenting a public IP address to the
external network.

The NAT configuration is as follows:

1. Configure NAT on the router interface connected to the internet.


2. Configure the NAT IP address: 203.0.113.1
3. Configure the NAT source and destination rules to translate internal IP addresses to the public IP
address.

Results:

By implementing FHRP and NAT, the small business network has improved the availability and security of its
network resources. FHRP ensures redundancy and load balancing, while NAT provides privacy and security.
The network can continue to operate even if one of the routers fails, and the internal network is protected
from external threats.

Conclusion:

In conclusion, FHRP and NAT are essential technologies for a small business network. FHRP provides
redundancy and load balancing, while NAT provides security and privacy. The implementation of FHRP and
NAT in this small business network has improved the availability and security of its network resources,
ensuring that the network can continue to operate even in the event of a failure.

Live Quiz
Module 8: VPN (Day 17)
● Introduction to VPN
● GRE
● IPSec VPN
● DMVPN

Lab Outline
● Lab 1: Configure and Verify a Generic Routing Encapsulation (GRE) Tunnel
● Lab 2: Configure IPSec
● Lab 3: Configure ISAKMP (ISAKMP Phase 1)
● Lab 4: Configure IPSec (ISAKMP Phase 2, ACLs, Crypto MAP)
● Lab 5: DMVPN Phase 1 Configuration
● Lab 6: DMVPN Phase 2 Configuration
● Lab 7: DMVPN Phase 3 Configuration
● Lab 8: DMVPN over IPSec

Case Study

Here are two case studies on IPSec and DMVPN:

1. IPSec Case Study:

Company X is a multinational corporation with offices located in different parts of the world. Due to the nature
of their business, they needed to establish secure connections between their various offices to protect their
sensitive data. They decided to use IPSec to encrypt their data in transit.

To implement IPSec, they first configured their routers with the necessary policies to establish secure tunnels
between their offices. They also used digital certificates to authenticate their devices and ensure that only
authorized devices were allowed to establish a secure connection.

With IPSec in place, Company X was able to ensure the security and privacy of their data while in transit. They
were also able to reduce the risk of data breaches, as their data was encrypted and therefore less susceptible
to interception or hacking.

2. DMVPN Case Study:

Company Y is a large retail chain with multiple branches located across the country. They needed to connect
their various branches to their headquarters to allow for real-time data sharing and collaboration. They
decided to use DMVPN to establish a secure and efficient network.

To implement DMVPN, they first configured their routers with the necessary policies to allow for dynamic IP
addressing and routing. They also used NHRP (Next Hop Resolution Protocol) to allow for efficient and dynamic
routing between their various branches.

With DMVPN in place, Company Y was able to establish a secure and efficient network that allowed for real-
time data sharing and collaboration. They were also able to reduce their costs, as they no longer needed to
lease expensive dedicated lines to connect their various branches.
Live Quiz

Module 9: BGP (Day 18-20)

BGP Overview

● Introduction to BGP
● Session Establishment (IBGP/EBGP)
● Path Attribute
● Route Processing
● Basic Configuration
● Monitoring and Troubleshooting

BGP Transit Autonomous Systems

● Working with a Transit AS


● Interacting with IBGP and EBGP in a Transit AS
● Forwarding Packets in a Transit AS
● Configuring a Transit AS
● Monitoring and Troubleshooting IBGP in a Transit ASR

Route Selection Using Policy Controls

● Multihomed BGP Networks


● Employing AS Path Filters
● Filtering with Prefix Lists
● Outbound Route Filtering
● Applying Route Maps as BGP Filters
● Implementing Changes in BGP Policy

Route Selection Using Attributes

● BGP Route Selection with Weights


● BGP Local Preference
● AS-Path Prepending
● BGP Multi-Exit Discriminator (MED)
● Addressing BGP Communities

Lab Outline

● Lab 1: Configure Basic BGP


● Lab 2: Announcing Networks in BGP
● Lab 3: Implement BGP TTL Security Check
● Lab 4: BGP Route Propagation
● Lab 5: IBGP Full Mesh
● Lab 6: BGP Administrative Distance
● Lab 7: Configure Non-Transit Autonomous System
● Lab 8: Filtering Customer Prefixes
● Lab 9: Prefix-Based Outbound Route Filtering
● Lab 10: Configure Route Maps as BGP Filters
● Lab 11: Configure Per-Neighbor Weights
● Lab 12: Configure and Monitor Local Preference
● Lab 13: Configure Local Preference Using Route Maps
● Lab 14: Configure AS Path Prepending
● Lab 15: Configure MED
● Lab 16: Configure Local Preference Using the Communities
● Lab 17: Configure Route Reflector
● Lab 18: Configure BGP Route Limiting
● Lab 19: Configure BGP Peer Groups

BGP Case study

BGP (Border Gateway Protocol) is a routing protocol that is used to exchange routing information among
different networks on the internet. Here are some case studies that demonstrate the use of BGP:

1. Inter-provider traffic engineering: In this case, two internet service providers (ISPs) are connected to
each other, and they need to control the traffic that passes between them. By using BGP, each ISP can
announce the routes that it wants to advertise to the other ISP, and can also set preferences for how
traffic should be directed. This allows the ISPs to control the flow of traffic between them and avoid
congested links.
2. Multi-homing: Multi-homing is when an organization connects to multiple ISPs to improve
redundancy and reliability. BGP is used to manage the routing of traffic between the different ISPs,
ensuring that traffic is always routed over the most efficient path.
3. Cloud connectivity: Cloud service providers (CSPs) use BGP to provide connectivity between their
customers and their cloud services. BGP allows CSPs to announce the IP addresses of their cloud
services to their customers, and to control how traffic is routed between their customers and their
cloud services.
4. Internet Exchange Points (IXPs): IXPs are physical locations where multiple ISPs connect to exchange
traffic. BGP is used to manage the routing of traffic between the different ISPs at the IXP, ensuring
that traffic is always routed over the most efficient path.
5. Network security: BGP is also used for network security purposes. By using BGP, network
administrators can implement route filtering and route authentication to prevent unauthorized
routing of traffic. This helps to protect against attacks such as IP hijacking and route leaks.
6. Amazon Web Services (AWS): AWS uses BGP to connect its data centers globally, providing reliable
and efficient communication between its different regions. By leveraging BGP, AWS can ensure that
traffic is routed to the nearest data center, minimizing latency and improving the overall user
experience.
7. YouTube: YouTube uses BGP to improve the reliability of its service by ensuring that traffic is rerouted
to an alternative path in the event of a network outage. This helps to minimize downtime and ensure
that users can access the platform without interruption.
8. Google: Google also uses BGP to manage its global network and ensure that traffic is routed efficiently
between its different data centers. By leveraging BGP, Google can optimize the path that traffic takes
to reach its destination, reducing latency and improving the overall performance of its services.
9. Internet Service Providers (ISPs): ISPs use BGP to exchange routing information with other ISPs and
ensure that traffic is routed efficiently across the Internet. By using BGP, ISPs can select the most
optimal path for traffic, reducing latency and improving the overall user experience.

Live Quiz

Module 10: QOS (Day 21 - 23)

● Module 1: Introduction to QoS


● Module 2: Implement and Monitor QoS
● Module 3: Classification and Marking
● Module 4: Congestion
● Module 5: Congestion Avoidance
● Module 6: Traffic Policing and
● Module 7: Deploying End-to-End QoS

Lab Outline

● Lab 1: IP SLA Setup and QoS Baseline Measurement


● Lab 2: Configuring QoS with Cisco AutoQoS
● Case Study 3-1: Classification and Marking
● Lab 3: Classification and Marking Using MQC
● Lab 4: Using NBAR for Classification
● Lab 5: Configuring QoS Preclassify
● Lab 6: Campus Classification and Marking Using MQC
● Lab 7: Configuring Fair Queuing
● Lab 8: Configuring LLQ-CBWFQ
● Lab 9: Configuring Campus-Based Queuing Mechanisms
● Lab 10: Configuring DSCP-Based WRED
● Lab 11: Configuring WTD Thresholds
● Lab 12: Configuring Class-Based Policing
● Lab 13: Configuring Class-Based Shaping
● Lab 14: Configuring Class-Based Header Compression

QOS Case studies

Here are a few case studies on Quality of Service (QoS):

1. VoIP Service Provider QoS Case Study: A VoIP service provider implemented QoS to improve call
quality and customer satisfaction. They found that without QoS, network congestion resulted in poor
call quality, causing customer complaints and churn. With QoS, they were able to prioritize VoIP traffic
and maintain call quality, leading to improved customer satisfaction and retention.
2. Online Gaming QoS Case Study: An online gaming company implemented QoS to reduce lag and
improve the overall gaming experience for users. Without QoS, network congestion caused latency
and packet loss, leading to frustrated gamers and negative reviews. With QoS, they were able to
prioritize gaming traffic and reduce lag, resulting in happier gamers and improved customer retention.
3. Healthcare Network QoS Case Study: A healthcare network implemented QoS to ensure critical
patient data could be transmitted without delay or interruption. Without QoS, network congestion
caused delays in transmitting data, leading to potential patient harm. With QoS, they were able to
prioritize critical data traffic and ensure timely transmission, leading to improved patient outcomes.
4. Video Streaming QoS Case Study: A video streaming service implemented QoS to provide a consistent
streaming experience for users. Without QoS, network congestion caused buffering and low-quality
video, leading to user frustration and churn. With QoS, they were able to prioritize video traffic and
ensure a consistent streaming experience, resulting in improved user retention.
These case studies demonstrate the importance of QoS in various industries and use cases, and how it can lead
to improved customer satisfaction and business outcomes.

Live Quiz

Module 11: SDWAN (Day 24-25)

● SDWAN Components
● Vmanage, Vsmart, Vbond, Wan Edge
● Initial prerequisite
● Org name, Site-id, System ip
● Controller verification
● Control Connection Verification
● Data connection verification
● TLOC verification
● Template Deployment Verification
● SDWAN policy Components
● Centralize control plane policy Deployment
● Verify control plane policy
● Hub and spoke, Mesh, Custom mesh
● Acl, Nat, DPI, Qos
● Application Aware Routing
● High Availability: Vsmart, Tloc-extention, vrrp
● Troubleshooting and verification

Lab Outline

● Lab 1: Manage and Monitor Cisco SD-WAN Components


● Lab 2: Deploy and Verify Cisco SD-WAN Edge Routers
● Lab 3: Deploy Cisco SD-WAN Edge Configuration
● Lab 4: Implement Cisco SD-WAN Overlay Routing
● Lab 5: Deploy Cisco SD-WAN Policies

Case Study

1. Toyota Financial Services (TFS): TFS is a financial services company that was struggling with network
issues caused by latency, application performance, and security concerns. They implemented Cisco
SD-WAN to reduce latency, optimize application performance, and improve security. With the help of
Cisco SD-WAN, TFS was able to reduce the time it took to onboard a new site from six months to just
two weeks, and they improved their overall network reliability by 80%.
2. Carhartt: Carhartt is a clothing and workwear company that needed to improve the reliability and
performance of their network, particularly for their retail stores. They implemented Cisco SD-WAN
and were able to reduce their MPLS costs by 50%, while also improving network performance and
reliability. With the help of Cisco SD-WAN, Carhartt was able to provide better connectivity for their
retail stores, resulting in improved customer experiences.
3. Banco Macro: Banco Macro is an Argentine bank that needed to improve their network performance
and security. They implemented Cisco SD-WAN and were able to improve their network performance
by up to 10 times, while also improving security and reducing costs. With the help of Cisco SD-WAN,
Banco Macro was able to provide better service to their customers and improve their overall business
operations.
4. Lion Group: Lion Group is a Malaysian conglomerate that needed to improve the performance and
reliability of their network, particularly for their retail stores. They implemented Cisco SD-WAN and
were able to reduce their MPLS costs by up to 50%, while also improving network performance and
reliability. With the help of Cisco SD-WAN, Lion Group was able to provide better connectivity for
their retail stores, resulting in improved customer experiences.

Overall, these case studies demonstrate the benefits of Cisco SD-WAN for improving network performance,
reducing costs, and improving security for various types of businesses.

Live Quiz

Module 12: Wireless Networks (Day 26-29)

● Describing and Implementing Foundational Wireless Theory


● Describing and Implementing Foundational Wireless Math and Antennas
● Describing and Implementing Foundational Wireless Operation
● Describing and Implementing Basic Wireless Security
● Describing and Implementing 802.1X and Extensible Authentication Protocol (EAP)
● Implementing Wireless Guest Access and Configuring Wireless Security
● Describing and Implementing Cisco Wireless Network Architecture
● Describing and Implementing Cisco Wireless Network
● Describing and Implementing Cisco Wireless Network Wired Support
● Configuring Cisco Centralized Wireless Networks
● Describing and Implementing WLAN Maintenance and Troubleshooting

Lab Outline

● Lab 1: Practice RF Math


● Lab 2: Antenna Calculations
● Lab 3: Explore the Wi-Fi Environment
● Lab 4: Analyze Wireless Frames
● Lab 5: Configure Client Access
● Lab 6: Configure the Wired Infrastructure
● Lab 7: Configure a Centralized Cisco Wireless LAN Controller (WLC) Deployment
● Lab 8: Configure a Centralized WLAN Deployment on Cisco 3504 WLC
● Lab 9: Configure a Centralized WLAN Deployment on Cisco 9800 WLC
● Lab 10: Configure an IPv6 Operation in a Centralized WLAN Deployment
● Lab 11: Optimize RF Conditions and Performance for Clients
● Lab 12: Perform Centralized Controller Maintenance
● Lab 13: Use Troubleshooting Tools
● Lab 14: Configure Wireless Client Authentication in a Centralized Deployment
● Lab 15: Troubleshoot Wireless Client Connectivity Issues

Case Study
1. Wi-Fi network design for a large university campus: This case study focuses on the wireless network
design for a large university campus with thousands of students, staff, and faculty members. The case
study explores the fundamentals of wireless networking, such as channel selection, antenna
placement, and access point deployment, to ensure optimal network coverage and performance.
2. Wireless network optimization for a manufacturing plant: This case study examines the challenges of
deploying and optimizing a wireless network in a manufacturing plant, which typically has a high level
of electromagnetic interference from machinery and equipment. The case study explores various
strategies for improving wireless signal strength and minimizing interference, including the use of
specialized antennas, frequency optimization, and signal amplification.
3. Wireless network security for a financial institution: This case study focuses on the fundamentals of
wireless network security, including encryption, authentication, and access control. The case study
examines the challenges of securing a wireless network for a financial institution, which handles
sensitive financial information that must be protected from unauthorized access.
4. Wireless network troubleshooting for a small business: This case study explores the basics of
troubleshooting wireless network connectivity issues in a small business environment. The case study
examines common problems such as signal interference, network congestion, and configuration
errors, and explores strategies for identifying and resolving these issues.
5. Wireless network scalability for a growing company: This case study focuses on the fundamentals of
wireless network scalability, including capacity planning, network architecture, and device
management. The case study examines the challenges of scaling a wireless network to accommodate
a growing number of users and devices, and explores strategies for ensuring network performance
and reliability as the network grows.

Live Quiz

Module 13: Voice over IP (Day 30-33)

Traditional Voice vs Unified Voice


● Analog Connection
● Digital Connection
● Understating PSTN
● Emergence of VoIP
● Role of DSP (Digital Signal Processors)
● Understanding RTP & RTCP

Understanding the Components of Cisco Unified Communications


● Unified Collaboration
● Understanding Cisco Unified Communication Manager Express (CME)
● CME key features
● CME interaction with Cisco IP Phone
● Basis of CUCM
Exploring Endpoints and the Registration Process
● Identify Cisco Endpoint Solutions
● Explore the Bootup Process of an Endpoint
● Describe PoE
● Configure an Access Switch for an Endpoint
● Describe IP Network Setting

Administering Initial Parameters for Cisco Unified Communications Manager


● Understanding the On-Premises Collaboration Deployment Models
● Describe the Cisco Unified Communications Manager Cluster Services
● Define Network Services for Collaboration
● Navigate Cisco Unified Communication Manager
● Understanding and Configuring Cisco Unified Communication Manager Initial Parameters
● Explore Cisco Unified Communication Manager Groups
● Configure the Cisco Unified Communication Manager Core System Settings
● Deploy a Cisco IP Phone Through Auto and Manual Registration

Exploring Codecs and Call Signaling


● Define Codecs
● Compare Audio Codecs
● Compare Video Codecs
● Describe the Call Setup and Teardown Process
● Describe SIP Call Signaling for Call Setup and Teardown
● Explore Media Streams at the Application Layer

Describing the Cisco ISR as a Voice Gateway


● Describe Cisco Voice Gateway
● Gateway Protocols (SIP, H323 and MGCP)
● Describe Call Legs and Dial Peers
● Configure VoIP Dial Peers
● Configure ISDN Circuits and POTS Dial Peers

Describing a Basic Dial Plan


● Describe the Concepts of a Dial Plan and Call Routing
● Describe Elements of Call Routing
● Explore Digit Manipulation and Translation Patterns
● Create a Basic Dial Plan
● Explore a Basic Dial Plan

Describing Class of Service


● Explore the concepts of Class of Control
● Explore Partitions and CSSs
● Configuring Partition and CSS on Cisco Unified Communication Manager

Lab Outline
● Lab 1: Configure an Access Switch for an Endpoint
● Lab 2: Configure the Cisco Unified Communication Manager Core System Settings
● Lab 3: Configure VoIP Dial Peers
● Lab 4: Configure ISDN Circuits and POTS Dial Peers
● Lab 5: Create a Basic Dial Plan
● Lab 6: Explore a Basic Dial Plan
● Lab 7: Configuring Partition and CSS on Cisco Unified Communication Manager

Case Study: Implementing a Global Dial Plan with Cisco Unified Communications

Company Overview:

XYZ Corporation is a global company with offices in multiple countries. The company uses Cisco Unified
Communications for its telephony and collaboration needs.

Challenge:

The company was experiencing difficulty with dialing between its offices in different countries. Each office had
its own dial plan, and there was no consistency between them. This made it difficult for employees to dial
numbers across the organization, and it also led to long-distance charges for international calls.

Solution:

The company decided to implement a global dial plan using Cisco Unified Communications. The project
involved the following steps:

Gateway Deployment: The first step was to deploy gateways at each office location. These gateways would
provide the necessary connectivity between the various offices.

Dial Plan Design: Next, the company designed a new dial plan that would be used across all its offices. The new
dial plan included a standardized numbering scheme, which ensured that every number in the organization
would follow the same format.

Digit Manipulation: The company also implemented digit manipulation rules to ensure that calls were routed
correctly. For example, if an employee in the London office dialed a number in the New York office, the call
would be routed through the appropriate gateway and translated to the correct format.

Translation Patterns: Translation patterns were also configured to allow for the translation of numbers
between different dial plans. For example, if an employee in the London office dialed a number in the Paris
office, the call would be translated to the appropriate format for the Paris office.

Route Patterns: Route patterns were created to define how calls would be routed across the network. This
included routing rules for intra-office calls as well as calls between different offices.

Results:

The implementation of the global dial plan was successful, and it led to a number of benefits for the company.
These included:
Increased Efficiency: The new dial plan made it much easier for employees to dial numbers across the
organization, which increased efficiency and productivity.

Cost Savings: The implementation of the global dial plan led to cost savings for the company, as it eliminated
the need for long-distance charges for international calls.

Simplified Management: The standardized dial plan made it easier for the company to manage its telephony
infrastructure, as there was no longer a need to manage multiple dial plans.

Live Quiz

Module 14: Zscaler Internet Access Fundamentals(Day 34-35)

● Describe what Zscaler Internet Access (ZIA) is and why its important to your organization
● Navigate the ZIA platform with ease to check various configurations
● Identify traffic forwarding best practices
● Recall user authentication methods and best practices
● Review and adjust internet access and security policies
● Resolve common internet access user issues

Case Studies:

1. Littelfuse: Littelfuse, a global leader in circuit protection, was experiencing challenges with its legacy
security infrastructure. The company's existing firewall and web security solutions were unable to
keep pace with its growing business needs, resulting in performance degradation and security gaps.
To address these challenges, Littelfuse turned to Zscaler Internet Access (ZIA) for cloud-delivered
security. By implementing ZIA, Littelfuse was able to achieve improved security, better visibility, and
faster performance. The company was also able to reduce costs by eliminating the need for hardware-
based security appliances.
2. Hilton: Hilton, a leading global hospitality company, was looking to improve its network security and
streamline its security operations. The company's existing security infrastructure was complex and
difficult to manage, resulting in security gaps and compliance issues. Hilton turned to Zscaler Internet
Access to provide cloud-delivered security and simplify its security operations. With ZIA, Hilton was
able to achieve improved security, better visibility, and simplified management. The company was
also able to reduce costs by eliminating the need for multiple security solutions.
3. Cushman & Wakefield: Cushman & Wakefield, a global real estate services firm, was experiencing
challenges with its legacy security infrastructure. The company's existing web security solution was
unable to keep pace with its growing business needs, resulting in performance degradation and
security gaps. To address these challenges, Cushman & Wakefield turned to Zscaler Internet Access
for cloud-delivered security. By implementing ZIA, Cushman & Wakefield was able to achieve
improved security, better visibility, and faster performance. The company was also able to reduce
costs by eliminating the need for hardware-based security appliances.

Overall, these case studies demonstrate the benefits of implementing Zscaler Internet Access for cloud-
delivered security, including improved security, better visibility, simplified management, and cost savings.

Live Quiz

Module 15: Soft Skill training (Day 35-40)


<Please insert soft skills content here>

Posttest covering all the modules.

You might also like