دوره ها
image description
سیسکو پیشرفته
محیط های سازمانی بزرگ برای بهبود عملکرد و دسترسی نیازمند  افراد متخصص در زمینه طراحی اصولی ساختار شبکه و همچنین توانمند در برنامه ریزی،پیاده سازی،تایید و رفع مشکلات شبکه میباشند. CCN ...

معرفی دوره

محیط های سازمانی بزرگ برای بهبود عملکرد و دسترسی نیازمند  افراد متخصص در زمینه طراحی اصولی ساختار شبکه و همچنین توانمند در برنامه ریزی،پیاده سازی،تایید و رفع مشکلات شبکه میباشند.

CCNP Cisco Certified Network Profasional 

توانایی برنامه ریزی ،پیاده سازی عیب یابی،ایمن سازی شبکه های کامپیوتری در سطح بزرگ 

CCDP Cisco Certified Design Profasional

طراحی و معماری ساختار شبکه های بزرگ

اهداف

اشنایی با استراتژی و اصول طراحی شبکه،اجرا پیاده سازی و ایمن سازی شبکه .ادرس دهی و مسیر یابی پیشرفته،سرویس های مجازی سازی و...  به صورت خلاصه شده در یک جمله یکپارچه سازی شبکه های بزرگ .

پیش نیاز

CCNA R & S

سرفصل ها

Route Exam 301-101

 Identify Cisco Express Forwarding concepts

  • 1.1.a FIB
  • 1.1.b Adjacency table

1.2 Explain general network challenges

  • 1.2.a Unicast
  • 1.2.b Out-of-order packets
  • 1.2.c Asymmetric routing

1.3 Describe IP operations

  • 1.3.a ICMP Unreachable and Redirects
  • 1.3.b IPv4 and IPv6 fragmentation
  • 1.3.c TTL

1.4 Explain TCP operations

  • 1.4.a IPv4 and IPv6 (P)MTU
  • 1.4.b MSS
  • 1.4.c Latency
  • 1.4.d Windowing
  • 1.4.e Bandwidth-delay product
  • 1.4.f Global synchronization

1.5 Describe UDP operations

  • 1.5.a Starvation
  • 1.5.b Latency

1.6 Recognize proposed changes to the network

  • 1.6.a Changes to routing protocol parameters
  • 1.6.b Migrate parts of the network to IPv6
  • 1.6.c Routing protocol migration

 Layer 2 Technologies

  2.1 Configure and verify PPP

  • 2.1.a Authentication (PAP, CHAP)
  • 2.1.b PPPoE (client side only)

       2.2 Explain Frame Relay

  • 2.2.a Operations
  • 2.2.b Point-to-point
  • 2.2.c Multipoint

 3.0 Layer 3 Technologies

3.1 Identify, configure, and verify IPv4 addressing and subnetting

  • 3.1.a Address types (Unicast, broadcast, multicast, and VLSM)
  • 3.1.b ARP
  • 3.1.c DHCP relay and server
  • 3.1.d DHCP protocol operations

3.2 Identify IPv6 addressing and subnetting

  • 3.2.a Unicast
  • 3.2.b EUI-64
  • 3.2.c ND, RS/RA
  • 3.2.d Autoconfig (SLAAC)
  • 3.2.e DHCP relay and server
  • 3.2.f DHCP protocol operations

3.3 Configure and verify static routing

3.4 Configure and verify default routing

3.5 Evaluate routing protocol types

  • 3.5.a Distance vector
  • 3.5.b Link state
  • 3.5.c Path vector

3.6 Describe administrative distance

3.7 Troubleshoot passive interfaces

3.8 Configure and verify VRF lite

3.9 Configure and verify filtering with any protocol

3.10 Configure and verify redistribution between any routing protocols or routing sources

3.11 Configure and verify manual and autosummarization with any routing protocol

3.12 Configure and verify policy-based routing

3.13 Identify suboptimal routing

3.14 Explain ROUTE maps

3.15 Configure and verify loop prevention mechanisms

  • 3.15.a Route tagging and filtering
  • 3.15.b Split-horizon
  • 3.15.c Route poisoning

3.16 Configure and verify RIPv2

3.17 Describe RIPng

3.18 Describe EIGRP packet types

3.19 Configure and verify EIGRP neighbor relationship and authentication

3.20 Configure and verify EIGRP stubs

3.21 Configure and verify EIGRP load balancing

  • 3.21.a Equal cost
  • 3.21.b Unequal cost

3.22 Describe and optimize EIGRP metrics

3.23 Configure and verify EIGRP for IPv6

3.24 Describe OSPF packet types

3.25 Configure and verify OSPF neighbor relationship and authentication

3.26 Configure and verify network types, area types, and router types

  • 3.26.a Point-to-point, multipoint, broadcast, nonbroadcast
  • 3.26.b LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
  • 3.26.c Internal router, backbone router, ABR, ASBR
  • 3.26.d Virtual link

3.27 Configure and verify OSPF path preference

3.28 Configure and verify OSPF operations

3.29 Configure and verify OSPF for IPv6

3.30 Describe, configure, and verify BGP peer relationships and authentication

  • 3.30.a Peer group
  • 3.30.b Active, passive
  • 3.30.c States and timers

3.31 Configure and verify eBGP (IPv4 and IPv6 address families)

  • 3.31.a eBGP
  • 3.31.b 4-byte AS number
  • 3.31.c Private AS

3.32 Explain BGP attributes and best-path selection

4.0 VPN Technologies

4.1 Configure and verify GRE

4.2 Describe DMVPN (single hub)

4.3 Describe Easy Virtual Networking (EVN)

5.0 Infrastructure Security

5.1 Describe IOS AAA using local database

5.2 Describe device security using IOS AAA with TACACS+ and RADIUS

  • 5.2.a AAA with TACACS+ and RADIUS
  • 5.2.b Local privilege authorization fallback

5.3 Configure and verify device access control

  • 5.3.a Lines (VTY, AUX, console)
  • 5.3.b Management plane protection
  • 5.3.c Password encryption

5.4 Configure and verify router security features

  • 5.4.a IPv4 access control lists (standard, extended, time-based)
  • 5.4.b IPv6 traffic filter
  • 5.4.c Unicast reverse path forwarding

 6.0 Infrastructure Services

6.1 Configure and verify device management

  • 6.1.a Console and VTY
  • 6.1.b Telnet, HTTP, HTTPS, SSH, SCP
  • 6.1.c (T)FTP

6.2 Configure and verify SNMP

  • 6.2.a v2
  • 6.2.b v3

6.3 Configure and verify logging

  • 6.3.a Local logging, syslog, debugs, conditional debugs
  • 6.3.b Timestamps

6.4 Configure and verify Network Time Protocol (NTP)

  • 6.4.a NTP master, client, version 3, version 4
  • 6.4.b NTP authentication

6.5 Configure and verify IPv4 and IPv6 DHCP

  • 6.5.a DHCP client, IOS DHCP server, DHCP relay
  • 6.5.b DHCP options (describe)

6.6 Configure and verify IPv4 Network Address Translation (NAT)

  • 6.6.a Static NAT, dynamic NAT, PAT

6.7 Describe IPv6 NAT

  • 6.7.a NAT64
  • 6.7.b NPTv6

6.8 Describe SLA architecture

6.9 Configure and verify IP SLA

  • 6.9.a ICMP

6.10 Configure and verify tracking objects

  • 6.10.a Tracking objects
  • 6.10.b Tracking different entities (for example, interfaces, IPSLA results)

6.11 Configure and verify Cisco NetFlow

  • 6.11.a NetFlow v5, v9
  • 6.11.b Local retrieval
  • 6.11.c Export (configuration only)

 Switch Exam 300-115

1.0 Layer 2 Technologies

1.1 Configure and verify switch administration

  • 1.1.a SDM templates
  • 1.1.b Managing MAC address table
  • 1.1.c Troubleshoot Err-disable recovery

1.2 Configure and verify Layer 2 protocols

  • 1.2.a CDP, LLDP
  • 1.2.b UDLD

1.3 Configure and verify VLANs

  • 1.3.a Access ports
  • 1.3.b VLAN database
  • 1.3.c Normal, extended VLAN, voice VLAN

1.4 Configure and verify trunking

  • 1.4.a VTPv1, VTPv2, VTPv3, VTP pruning
  • 1.4.b dot1Q
  • 1.4.c Native VLAN
  • 1.4.d Manual pruning

1.5 Configure and verify EtherChannels

  • 1.5.a LACP, PAgP, manual
  • 1.5.b Layer 2, Layer 3
  • 1.5.c Load balancing
  • 1.5.d EtherChannel misconfiguration guard

1.6 Configure and verify spanning tree

  • 1.6.a PVST+, RPVST+, MST
  • 1.6.b Switch priority, port priority, path cost, STP timers
  • 1.6.c PortFast, BPDUguard, BPDUfilter
  • 1.6.d Loopguard and Rootguard

1.7 Configure and verify other LAN switching technologies

  • 1.7.a SPAN, RSPAN

1.8 Describe chassis virtualization and aggregation technologies

2.0 Infrastructure Security

2.1 Configure and verify switch security features

  • 2.1.a DHCP snooping
  • 2.1.b IP Source Guard
  • 2.1.c Dynamic ARP inspection
  • 2.1.d Port security
  • 2.1.e Private VLAN
  • 2.1.f Storm control

2.2 Describe device security using Cisco IOS AAA with TACACS+ and RADIUS

  • 2.2.a AAA with TACACS+ and RADIUS
  • 2.2.b Local privilege authorization fallback

 3.0 Infrastructure Services

3.1 Configure and verify first-hop redundancy protocols

  • 3.1.a HSRP
  • 3.1.b VRRP
  • 3.1.c GLBP

 Arche Exam 300-320

1.1 Create structured addressing designs to facilitate summarization

  • 1.1.a Hierarchy
  • 1.1.b Efficiency
  • 1.1.c Scalability
  • 1.1.d NAT

1.2 Create stable, secure, and scalable routing designs for IS-IS

1.3 Create stable, secure, and scalable routing designs for EIGRP

1.4 Create stable, secure, and scalable routing designs for OSPF

1.5 Create stable, secure, and scalable routing designs for BGP

  • 1.5.a Transit prevention
  • 1.5.b Basic route filtering
  • 1.5.c Authentication
  • 1.5.d Communities
  • 1.5.e Basic traffic engineering (load distribution, creating path symmetry)
  • 1.5.f Route reflectors

1.6 Determine IPv6 migration strategies

  • 1.6.a Overlay (tunneling)
  • 1.6.b Native (dual-stacking)
  • 1.6.c Boundaries (IPv4/IPv6 translations)

 

2.1 Design for high availability

  • 2.1.a First Hop Redundancy Protocols
  • 2.1.b Device virtualization

2.2 Design campus Layer 2 infrastructures

  • 2.2.a STP scalability
  • 2.2.b Fast convergence
  • 2.2.c Loop-free technologies

2.3 Design multicampus Layer 3 infrastructures

  • 2.3.a Convergence
  • 2.3.b Load sharing
  • 2.3.c Route summarization
  • 2.3.d Route filtering
  • 2.3.e VRFs
  • 2.3.f Optimal topologies

2.4 Design a network to support network programmability

  • 2.4.a Describe Application Centric Infrastructures (ACI)
  • 2.4.b Select appropriate controller to meet requirements
  • 3.1 Compare and contrast WAN connectivity options

  • 3.1.a Dynamic Multipoint VPN (DMVPN)
  • 3.1.b Layer 2 VPN
  • 3.1.c MPLS Layer 3 VPN
  • 3.1.d IPsec
  • 3.1.e Generic Routing Encapsulation (GRE)
  • 3.1.f Private lines
  • 3.2 Design site-to-site VPNs

  • 3.2.a DMVPN
  • 3.2.b Layer 2 VPN
  • 3.2.c MPLS Layer 3 VPN
  • 3.2.d IPSec
  • 3.2.e Group Encrypted Transport VPN (GETVPN)
  • 3.3 Design for a resilient WAN strategy

  • 3.3.a Single-homed
  • 3.3.b Multi-homed
  • 3.3.c Backup connectivity
  • 3.3.d Failover
  • 3.4 Design Extranet connectivity

  • 3.4.a VPN
  • 3.4.b Private lines
  • 3.4.c Multitenant segmentation
  • 3.5 Design Internet edge connectivity

  • 3.5.a DMZ
  • 3.5.b NAT
  • 3.5.c Proxy functionality
  • 3.5.d Resiliency
  • 3.5.e Basic traffic engineering techniques (outbound/inbound load distribution, active/failover, symmetric outbound traffic flows)
  •  

4.1 Describe a modular and scalable data center network

  • 4.1.a Top-of-rack
  • 4.1.b End-of-row
  • 4.1.c Multitenant environments
  • 4.1.d Multitier topologies

4.2 Describe network virtualization technologies for the data center

  • 4.2.a VPC
  • 4.2.b VSS
  • 4.2.c VDCs
  • 4.2.d VRFs
  • 4.2.e Multichassis EtherChannel
  • 4.2.f VXLAN
  • 4.2.g TRILL / Fabric Path

4.3 Describe high availability in a data center network

  • 4.3.a VPC
  • 4.3.b VSS
  • 4.3.c Multichassis EtherChannel

4.4 Design data center interconnectivity

  • 4.4.a OTV
  • 4.4.b Private Line
  • 4.4.c L2 vs. L3
  • 4.4.d VPLS
  • 4.4.e A-VPLS

4.5 Design data center and network integration

  • 4.5.a Traffic flow
  • 4.5.b Bandwidth
  • 4.5.c Security
  • 4.5.d Resiliency

5.1 Design firewall and IPS solutions

  • 5.1.a Modes of operation
  • 5.1.b Clustering
  • 5.1.c High availability techniques
  • 5.1.d IPS functionality and placement
  • 5.1.e Multiple contexts

5.2 Design network access control solutions

  • 5.2.a 802.1x
  • 5.2.b TrustSec
  • 5.2.c EAP
  • 5.2.d Authentication services
  • 5.2.e RBAC
  • 5.2.f Basic denial of service mitigation techniques

5.3 Design infrastructure protection

  • 5.3.a Infra structure ACLs
  • 5.3.b CoPP
  • 5.3.c Layer 2 / Layer 3 security considerations

6.1 Select appropriate QoS strategies to meet customer requirements

  • 6.1.a DiffServ
  • 6.1.b IntServ

6.2 Design end-to-end QoS policies

  • 6.2.a Classification and marking
  • 6.2.b Shaping
  • 6.2.c Policing
  • 6.2.d Queuing

6.3 Describe network management techniques

  • 6.3.a In-band vs. out-of-band
  • 6.3.b Segmented management networks
  • 6.3.c Prioritizing network management traffic

6.4 Describe multicast routing concepts

  • 6.4.a Source trees, shared trees
  • 6.4.b RPF
  • 6.4.c Rendezvous points

6.5 Design multicast services

  • 6.5.a SSM
  • 6.5.b PIM bidirectional
  • 6.5.c MSDP

DESGN Exam 200-310

1.0 Design Methodologies

1.1 Describe the Cisco Design lifecycle – PBM (plan, build, manage)

1.2 Describe the information required to characterize an existing network as part of the planning for a design change

1.3 Describe the use cases and benefits of network characterization tools (SNMP, NBAR, NetFlow)

1.4 Compare and contrast the top-down and bottom-up design approaches

2.0 Design Objectives

2.1 Describe the importance and application of modularity in a network

2.2 Describe the importance and application of hierarchy in a network

2.3 Describe the importance and application of scalability in a network

2.4 Describe the importance and application of resiliency in a network

2.5 Describe the importance and application of concept of fault domains in a network

3.0 Addressing and Routing Protocols in an Existing Network

 

3.1 Describe the concept of scalable addressing

  • 3.1.a Hierarchy
  • 3.1.b Summarization
  • 3.1.c Efficiency

3.2 Design an effective IP addressing scheme

  • 3.2.a Subnetting
  • 3.2.b Summarization
  • 3.2.c Scalability
  • 3.2.d NAT

3.3 Identify routing protocol scalability considerations

  • 3.3.a Number of peers
  • 3.3.b Convergence requirements
  • 3.3.c Summarization boundaries and techniques
  • 3.3.d Number of routing entries
  • 3.3.e Impact of routing table of performance
  • 3.3.f Size of the flooding domain
  • 3.3.g Topology

3.4 Design a routing protocol expansion

  • 3.4.a IGP protocols (EIGRP, OSPF, ISIS)
  • 3.4.b BGP (eBGP peering, iBGP peering

 4.0 Enterprise Network Design

4.1 Design a basic campus

  • 4.1.a Layer 2/Layer 3 demarcation
  • 4.1.b Spanning tree
  • 4.1.c Ether channels
  • 4.1.d First Hop Redundancy Protocols (FHRP)
  • 4.1.e Chassis virtualization

4.2 Design a basic enterprise network

  • 4.2.a Layer 3 protocols and redistribution
  • 4.2.b WAN connectivity
    • 4.2.b(i) Topologies (hub and spoke, spoke to spoke, point to point, full/partial mesh)
    • 4.2.b(ii) Connectivity methods (DMVPN, get VPN, MPLS Layer 3 VPN, Layer 2 VPN, static IPsec, GRE,VTI)
    • 4.2.b(iii) Resiliency (SLAs, backup links, QoS)
  • 4.2.c Connections to the data center
  • 4.2.d Edge connectivity
    • 4.2.d(i) Internet connectivity
    • 4.2.d(ii) ACLs and firewall placements
    • 4.2.d(iii) NAT placement

4.3 Design a basic branch network

  • 4.3.a Redundancy
    • 4.3.a(i) Connectivity
    • 4.3.a(ii) Hardware
    • 4.3.a(iii) Service provider
  • 4.3.b Link capacity
    • 4.3.b(i) Bandwidth
    • 4.3.b(ii) Delay

 5.0 Considerations for Expanding an Existing Network

5.1 Describe design considerations for wireless network architectures

  • 5.1.a Physical and virtual controllers
  • 5.1.b Centralized and decentralized designs

5.2 Identify integration considerations and requirements for controller-based wireless networks

  • 5.2.a Traffic flows
  • 5.2.b Bandwidth consumption
  • 5.2.c AP and controller connectivity
  • 5.2.d QoS

5.3 Describe security controls integration considerations

  • 5.3.a Traffic filtering and inspection
  • 5.3.b Firewall and IPS placement and functionality

5.4 Identify traffic flow implications as a result of security controls

  • 5.4.a Client access methods
  • 5.4.b Network access control

5.5 Identify high-level considerations for collaboration (voice, streaming video, interactive video) applications

  • 5.5.a QoS (shaping vs. policing, trust boundaries, jitter, delay, loss)
  • 5.5.b Capacity
  • 5.5.c Convergence time
  • 5.5.d Service placement

5.6 Describe the concepts of virtualization within a network design

5.7 Identify network elements that can be virtualized

  • 5.7.a Physical elements (chassis, VSS, VDC, contexts)
  • 5.7.b Logical elements (routing elements, tunneling, VRFs, VLANs)

5.8 Describe the concepts of network programmability within a network design

  • 5.8.a APIs
  • 5.8.b Controllers
  • 5.8.c Application Centric Infrastructure (ACI)

5.9 Describe data center components

  • 5.9.a Server load balancing basics
  • 5.9.b Blocking vs. non-blocking Layer 2
  • 5.9.c Layer 2 extension

 

زمان بندی

# مدت تاریخ شروع شهریه نوع دوره روزهای هفته و ساعت
1 100 ساعت 18 خرداد 1397 1,390,000 تومان عادی جمعه ها