Autoplay
Autocomplete
Previous Lesson
Complete and Continue
🚀 Mastering CCNP ENCOR 350-401: Enterprise Network Core Technologies
ENCOR-350-401
CCNP ENCOR-350-401 (7:24)
CCNP ENCOR-Contents (11:57)
About Certifications
Cisco Certification Updates (11:15)
ABout Cisco (1:11)
Cisco Re-Certification (0:53)
CCNP Certifications (0:55)
CCIE Certifications (1:55)
Cisco Certification Migration Options (5:55)
Required Exams for CCNP (2:30)
EVE-NG - Virtual Platform
EVE-nG Professional License (6:34)
EVE-NG Virtual Platfrom (6:31)
IOL Devices - EVE-nG (7:17)
Upload SD-WAN Images - EVE-NG (8:18)
Adding Viptela Devices - EVE-NG Lab (5:50)
ASA - EVE-NG (7:08)
WIndows - EVE-NG (10:10)
Connecting WIndows PC- EVE-Topology (11:58)
Connecting WIndows PC - Internet (9:28)
CSR1000v - EVE-NG (6:30)
LABS- VIRTUAL--GNS3
Supported Virtual Images - GNS3- EVE-ng (7:39)
Cisco Lab Options (7:35)
About GNS3 (3:44)
Installing GNS3 on Windows (6:39)
GNS3 - Adding IOS Images (5:57)
Default Topology- IOS Routers -Initial Configurations (5:13)
IOS Default Topology (9:19)
Connecting GNS3 Topology to Host Computer (6:02)
GNS3- VMWARE Integration (9:16)
GNS3 - IOSv L2-L3 Configuration Steps (5:54)
GNS3 - ASAv Setup (4:17)
GNS3- IOU- L2-L3 Configuation Steps (2:38)
Basic Switching
Local Area Network (3:09)
Ethernet (6:51)
SOHO LANs (8:01)
Enterprise LAN (5:10)
Transmission Media - UTP cables (13:31)
Fiber Cables - Wireless (2:22)
Basic LAN Setup (9:36)
Address Resolution Protocol - ARP (6:30)
VIRTUAL LAN - VLANs
What is Broadcast Domain (7:43)
What is VLAN (13:50)
VLAN Types (13:25)
VLAN Ranges (2:33)
Creating VLANs (5:22)
VLANs- Assigning Ports (12:05)
VLAN-Design (7:00)
Voice VLAN (9:27)
Management VLAN (8:47)
TRUNKING
Trunk Links (4:06)
VLANs- Multiple Switches (6:43)
Access- Trunk LInks (5:24)
802.3 Ethernet Frame Format (10:08)
Frame Tragging - on Trunk Links (12:09)
Trunking Protocols - ISL-DOT1Q (4:33)
Trunk Link - Configuration (10:24)
INTER-VLAN ROUTING
Forward Packets beween VLANs (3:50)
VLAN Routing - Methods (1:35)
VLAN Routing- Physical Gateways (5:58)
VLAN Rouiting -Physical Gateway - Configuration (12:12)
VLAN Routing Physical Gateway- Limitations (1:45)
VLAN Routing - Subinterfaces (4:08)
VLAN Routing - Subinterfaces - Configuration - PART 1 (10:00)
VLANRouting- Subinterfaces -PART 2 (15:59)
VLAN Routing SubInterfaces - Advantages - DisAdvantages (4:36)
VLAN Routing – SVI – L3 Switch (7:53)
SVI- Configurations (10:20)
SVI - Multiple Switches (14:52)
L3 Routed Ports (7:25)
Logical vs Physical Topology
Default Physical Topology (7:06)
logical Topology Example 1 (9:50)
logical Topology Example 2 (10:57)
logical Topology Example 3 (12:11)
logical Topology Mock topology1 (12:02)
logical Topology Mock topology2 (14:56)
logical Topology Mock topology3 (14:56)
logical topology using all sub interfaces (14:19)
GNS3- SWITCHING LABS
SWITCHING LABS -with GNS3 (13:48)
VLAN Configuration - GNS3 (9:38)
TRUNKING LAB - GNS3 (7:45)
INTER VLAN ROUTING - PHYSICAL GATEWAY - GNS3 (13:40)
INTER VLAN ROUTING - SIB-INTERFACES - GNS3 (6:33)
INTER VLAN ROUTING -L3 SWITCH - GNS3 (9:55)
VLAN Trunking Protocol - VTP
What is VTP (6:18)
VTP Modes (13:14)
VTP-configuration (12:07)
Spanning Tree Protocol - STP
Bridging loops with Redundant links (10:33)
Bridging Loops - STP (5:53)
How STP Works (2:49)
Selecting Root Bridge (9:55)
Root Bridge - Verfication (4:19)
Root Port Selection- PART 1 (11:45)
Root Port Selection- PART 2 (11:19)
STP Till now - Review (7:11)
Selecting Designated Ports (16:46)
STP Terminology
STP – Hello BPDUs (2:41)
Root Port -VS- Designated Ports (4:42)
STP Convergence (13:08)
STP Timers (3:08)
STP Interfaces States (5:09)
STP Tuning
selecting root brigde stp (15:41)
Campus model (13:38)
Tuning STP Cost-prorityptimers (19:53)
Etherchannel - PortChannel (16:34)
Spaning Tree PortFast (7:02)
Rapid STP
Rapid STP - RSTP (9:54)
Rapid STP Convergence (13:08)
RSTP Port Roles (17:57)
RSTP BPDU (2:26)
Troubleshooting
CDP (17:36)
LLDP (2:28)
Troubleshooting LAN connectivity11 - physical connectivity (11:08)
Troubleshooting LAN connectivity11 - Duplex-AutoMDIX (11:09)
Troubleshooting VLANs (16:49)
Troubleshooting Trunking (10:20)
Troubleshooting Trunk links - LAB (13:38)
Per VLAN STP / Mutliple STP
Per VLAN Spanning Tree Protocol - PVST (11:01)
Multiple STP - MSTP (9:00)
MSTP - Lab - GNS3 IOU Switch (22:11)
MSTP LAB - Physical Rack (16:19)
Tuning MSTP - port Priortiy (8:55)
Switch port Analyzer - SPAN - Remote SPAN
SPAN - Configuration Example (3:57)
SPAN - Switch Port Analyser (12:09)
Remote Switch Port Analyser - RSPAN (10:03)
rspan2 (7:20)
ERSPAN (1:46)
SPAN conditions and Restrictions (5:45)
ROUTING
What is ROUTING (12:00)
Types of Routing (5:20)
STATIC ROUTING
Static Routing (3:20)
Static Routing - Configuration Example 1 (9:19)
Static Routing - Configuration Example 2 (9:26)
Static Routing - Next Hop or Exit interface (5:34)
Routing - How it Works (6:11)
Static Routing - Multiple Paths (4:44)
Floating Static Routes (8:27)
DEFAULT ROUTING
Whst is Default Routing (18:40)
Default Routing - Configuration Example (13:11)
Floating Default Routing (11:26)
Default Routing Verfification - Real Scenario (24:45)
Open Shortest Path First - OSPF
Knowledge - Prerequisite (2:01)
Open Shortest Path First - OSPF (6:12)
OSPF - How it Works (3:28)
OSPF – Becoming Neighbors (11:04)
Router-ID (12:40)
OSPF - LSDB- Database (5:18)
Exchanging the LSDB (6:26)
Synchornize LSDB- Best Route (4:57)
Maintaining Neighbors - LSDB (7:36)
OSPF -Tables (2:31)
OSPF Configuration- Single Area
OSPF - Wild Card Mask (9:14)
OSPF Configuration Syntax (8:15)
OSPF Single Area - Pre-Requiste (2:30)
OSPF Single Area-Configuration (7:00)
OSPF - Single Area- Verification (8:52)
OSPF - Advertisement Example (4:07)
OSPF Metric - Cost
OSPF Metric - COst (5:59)
Calculate Best Routes - OSPF (5:48)
Changing Interface Bandwidth (5:49)
Default Reference BW- LImitiations (1:25)
Manual Cost (3:49)
Auto-Cost Reference BW (6:04)
OSPF Areas
MUltiple Areas (7:05)
OSPF Single Area - Limitations (7:13)
MUlti-Ares -Design Rules (14:31)
Multi-Area - Configurations (5:05)
LAB - Mutl-Area- Configuration (11:51)
OSPFv2 Interface SubCommands (9:33)
OSPF Network Types
SPF Broadcast Networks- DR-BDR (9:40)
OSPF Network Types (7:29)
DR-BDR - ELections (9:12)
OSPF DR-BDR - Lab (12:48)
OSPF Point to Point LInks (8:52)
Default Routes - OSPF
OSPF Default Routes Advertisements (3:32)
Advertiing Default Routes -IGP (8:45)
OSPF Default Route- LAB (12:54)
OSPF Default Routes - Options (9:52)
Enhanced Interior Gateway Routing Protocol - EIGRP
Enhanced Interior Gateway Routing Protocol - EIGRP (5:14)
EIGRP - How it works (5:39)
Verify EIGRP Process (5:18)
EIGRP Tables (5:43)
EIGRP Convergence (3:45)
EIGRP Metric Path Calculation - 1 (13:41)
EIGRP Metric Path Calculation - 2 (9:41)
EIGRP Configuration (14:00)
Successor- Feasible Succesor (5:31)
Feasbile - Reporting Distance (11:38)
Feasiblity Condition (8:55)
Summarization - IPV4
Summarization (9:44)
Summarization - Advantages (3:32)
Auto-Summary (8:24)
AutoSummary-Verification (6:00)
Manual Summary (3:20)
Calculate Summary Address- EX-1 (9:02)
Calculate Summary Address- EX-2 (2:32)
Calculate Summary Address- EX-3 (2:19)
Summarization Conditions (10:13)
010 EIGRP Summarization (11:24)
011 Summarization - NULL 0 (15:34)
012 OSPF Summarization LAB (15:12)
IPv6
IPV6- Introduction (8:47)
IPv6 Addressing (6:35)
IPV6 Address types (17:09)
IPV6 Static Addressing (10:43)
IPv6 Static-Default Routing (13:21)
OSPFv3 (13:43)
EIGRP-IPv6 (14:57)
EIGRP6 Summarization (8:23)
OSFv3 Summarization (11:12)
Border Gateway Protocol
BGP Autonomous system Number (8:10)
IGP - EGP Routing Protocols (3:30)
Border Gateway Protocol -BGP (8:19)
BGP -When to use-When not to use (8:22)
ISP Connection Types (5:13)
BGP route Exchange with ISP (8:29)
BGP Neighbors - Internal-External
Internal BGP - External BGP (4:26)
IBGP neighbors - Configuration (16:00)
BGP Split Horizon Rule (8:24)
- BGP Split horzon rule - Full mesh Neighbors (5:36)
IBGP using Loopbacks (9:11)
IBGP loopbacks Configuration (14:46)
IBGP Update Source Loopback (11:18)
EBGP Neighbors -Configuration (5:42)
BGP Next-Hop-Self (18:52)
BGP Attributes
BGP Attributes (8:18)
As-Path Attribute (7:29)
Next-Hop Attribute (2:16)
Origin Attribute (4:13)
Show ip bgp - output (7:36)
Weight Attribute (7:19)
Verify Weight Attribute - LAB 1 (11:24)
Weight - using Route-maps (18:05)
Local Preference Attribute (9:51)
Local Prefernce- LAB 1 (8:21)
Local Preference- LAB 2 (8:18)
Inbound vs Outbound (7:04)
BGP Path Selecttion Steps (13:31)
Threat Defense Technologies
What is Firewall (7:42)
Next Generation Firewalls (5:30)
AAA- Network Security (10:37)
Cisco Traffic Telemetry methods (3:39)
Virtual Private Networks (4:12)
Web Access-Possible Threats (3:51)
Web Traffic-Security (2:01)
Cisco Web Security - WSA - CWS (3:09)
Email Based Threats (2:27)
Cisco Email Security - ESA - CES (3:13)
Intrusion Prention System - IPS (4:22)
Network Infrastructure Protection
Network InFrastructure Protection (5:21)
Identify Network Planes (8:18)
Data Plane (6:09)
Control Plane (3:27)
Management Plane (2:31)
Remote Management Telnet -SSH
Remote Access - Telnet (5:55)
Inband vs OutBand (7:02)
Remote Access - SSH (9:18)
AAA
Components (3:50)
AAA- Network Security (10:37)
AAA - Protocols -TACACS- RADIUS (7:35)
AAA - Cisco Authentication Servers (3:51)
AAA Authentication
Authenticaiton - Local Database (9:55)
AAA Authentication - Device Access (2:55)
AAA - External Servers (3:19)
LAB- Authentication - TACACS (11:34)
AAA Authorization
Authorization - Device Access (3:27)
IOS Privilege Levels (8:48)
LAB -Local Authorization- Privilege Levels (14:23)
IOS Privilege Levels - Limitations (4:57)
Access Control LIsts - ACL
ACL Types (2:38)
Access Control LIsts (12:02)
Standard - Extended ACL (9:34)
ACL Logic- How Match Rules (8:38)
Standard ACL
Standard ACL lab - PreRequisite (6:03)
Standard ACL Lab (4:42)
ACL - Wild Card Mask (11:21)
ACL Statements- Things to Know (8:45)
Standard ACL - Configuration (10:54)
Apply ACL - Select Right Interface (10:17)
Standard ACL- IN- OUT (10:45)
Standard ACL - Verification (6:22)
Standard ACL- Wrong Direction (5:33)
Standard ACL - Practice Examples (8:03)
Standard ACL- Find IP-Ranges (10:33)
Extended ACL
Extended ACL (3:59)
Extended ACL- Lab Pre-REquisite (8:24)
Extended ACL - Config Example (1:50)
Similarities- Extended - Standard ACL (3:28)
Extended ACL- Things to Know (8:31)
Extended ACL- Syntax (11:00)
Extended ACL- Configuration (10:30)
ended ACL-Apply - Verify (13:13)
Extended ACl - Examples (13:23)
Named ACL
Named ACLs (10:42)
Named ACL- Syntax (5:35)
Named Standard ACL - Configuration (2:04)
Named Extended ACL - Configuration (1:25)
Editing Named ACLs (8:55)
Control Plane Security
Routing Protocol Authentication (11:50)
Control Plane - Possible Threats (8:32)
Control Plane Policing -CoPP (7:11)
Classmap -Policymap -Hierarchy (5:23)
CoPP_ Configuration Example (12:14)
Cisco Telemetry Services
Device-Network Events Logging (9:39)
Cisco Traffic Telemetry methods (3:39)
Syslog - Terminal Logging (6:48)
Network Time Protocol (7:01)
NTP -Stratum Value (3:40)
LAB - NTP - Configuration (8:46)
VPN-Basics
VPN-Introduction (5:09)
VPN Types (3:49)
VPN Logical Topologies (1:25)
VPN Default Lab Setup- Routers (5:22)
VPN Default Topology - IOU - GNS3 (11:49)
GRE -Generic Routing encapsulation
Generic Routing encapsulation (3:31)
LAB- GRE point to point Configuration (9:07)
GRE Tunnels - Encapsulation (8:12)
Drawbacks of GRE (5:14)
DMVPN (Dynamic Multipoint VPN)
DMVPN-Protocols (4:07)
DMVPN (Dynamic Multipoint VPN) (7:15)
DMVPN - mGre Tunnels (3:27)
DMVPN-NHRP Protocol - Messages (11:00)
VPN Default Lab Setup- Routers (5:22)
DMVPN-Basic Tunnel Configuration Example (15:27)
EIGRP Routing over DMVPN (9:37)
Internet Protocol Security - IPSEC
IPsec Security Services (6:53)
Internet Protocol Security - IPSEC (2:48)
IPsec Modes - Tunnel vs Transport (5:29)
IPSec Site to site VPN
How IPsec VPN works (5:19)
Step-1 Interesting Traffic Configuration (3:02)
Step-2 IKE Phase-1 (7:36)
Step-3- IKE - Phase 2 (8:30)
IKE Phase -2 Configuration- Verification (6:56)
Network Address Translation - NAT
NAT- What we Cover (0:51)
Why do we need NAT (6:33)
What is NAT (7:55)
NAT Types (11:39)
NAT - Lab Setup (15:19)
Static NAT - LAB (11:48)
Dynamic NAT- LAB (10:11)
PAT- LAB (11:01)
PAT with Exit Interface (7:42)
First Hop Redundancy
First Hop Redundancy _ introduction (16:23)
FHRP protocols differences (10:09)
HSRP lab - Basic (16:15)
HSRP lab - Advance Options (11:50)
HSRP load sharing using Multiple groups (6:55)
VRRP- Lab (11:24)
GLBP - lab (12:52)
GLBP - Track and load balancing (15:01)
IP SLA
IP SLA- Configuration Example (11:23)
IP Service Level Agreement - IP SLA (9:24)
IP Multicasting
Multicast-Benifits (5:09)
IP Multicasting (11:04)
How Multicast works (6:16)
Multicast IP Range (7:24)
IGMP - PIM protocols
IGMP Protocol and Versions (13:51)
Protocol independent Multicast (6:49)
PIM Modes -Trees (6:57)
Dense mode - Configuration (16:15)
RPF check _ loop prevention (12:06)
PIM Sparse Mode- RP
Sparse-Mode Configuration (12:53)
PIM sparse-mode Operation (13:54)
Static RP (4:45)
Auto-RP (6:50)
Auto-RP Configuration (15:09)
Auto-RP Redundancy (17:14)
Auto-RP Load Sharing (15:48)
PIM-Bootstrap Router (8:45)
Quality of Service (QoS)
Network Congestion - Reasons (9:00)
Quality of Service -QoS (8:07)
Qos Models (10:19)
QoS Classification
Qos - Classification (10:21)
Modular Qos CLI - Hierarchy (4:33)
Classification - Configuration (7:03)
QoS Marking
Qos - Marking (6:11)
Qos - Layer 2 Marking (9:32)
Qos-Layer 3 Marking (3:41)
L3 Marking - IP Precendence (3:10)
IP Precendece - Configuration (10:27)
DSCP Marking (14:57)
DSCP Marking - Example (4:41)
Congestion Management - Queueing
Congestion Management - Queuing (11:06)
What is Congestion (6:43)
Legacy Queuing Methods (7:10)
Weighted Fair Queuing -WFQ (7:54)
Class based Weighted Fair Queuing - CBWFQ (2:42)
Class Based WFQ – Fixed Bandwidth (13:46)
Class Based WFQ – Bandwidth Percent (7:08)
Low Latency Queuing (6:18)
Congestion Avoidance - WRED
Random Early Detection (5:21)
Tail Drop - Congestion Avoidance (7:54)
Weighted Random Early Detection – WRED (8:29)
WRED – Configuration (5:31)
Class-based WRED - Configuration (9:02)
Qos - Traffic Policing-Shaping
Traffic Policing and Shaping (7:59)
Network Management
Past-Present Methods of Network Management - PART 1 (13:54)
What is Network Management (8:04)
Past-Present Methods of Network Management - PART 2 (7:08)
SNMP (18:05)
Network Automation
Network Automation- Goals (15:39)
Challenges - Traditional Management (11:12)
Types of Network Automation (6:19)
What can be Automated- PART 1 (11:59)
What can be Automated - PART 2 (8:33)
Impact of Network Automation (8:19)
SDN and Controllers
SDN- Software Defined Networking (14:30)
Automation Origination Points (8:20)
SDN Controllers (8:43)
Networks Managed by SDN Controllers (12:56)
SDN-Control-MGmt-Data Plane
Identify Network Device Planes (1:40)
Identify Network Device Planes (2:44)
Data Plane (6:09)
Control Plane (3:27)
Management Plane (2:31)
SDN- mangement Plane (7:08)
SDN - Control Plane- Data Plane (5:58)
SDN Models-Architecture
SDN - Declarative Model (7:25)
SDN - Imperative Model (4:50)
SDN-Network Design Requirments (8:40)
Underlay Networks (7:18)
Overlay Networks (6:40)
SDN Fabric (6:05)
API-Applicaion Programming Interface
API - Application Programming Interface (11:17)
API - Types (4:05)
API - with SDN Networks (8:43)
NorthBound API (8:49)
SounthBOund API (7:56)
Cisco Devnet-Sandbox
Cisco DEVNET (4:39)
DevNET Certifications (4:40)
DevNET SandBox (6:14)
Sandbox LABS (8:03)
Sandabox Lab Access-Reservations (3:19)
Cisco DNA Center
DNA Center Applicance (4:06)
Cisco DNA Center (15:57)
DNA Cnter- What can do - PART 1 (11:28)
DNA Cnter- What can do - PART 2 (13:06)
Web Service API - Rest API
Web Service API (7:52)
Web Service API - Commonly Used (7:44)
REST API (8:14)
Network Automation Tools
Conig MGMT Tools - Capabilities (8:53)
Config MGMT Tools (6:24)
Config-MGMT tools - Similarities (5:53)
Master - Agent (5:30)
Agentbased- Agentless (6:57)
Push-Pull Model (10:19)
Configuration Files (5:29)
PUPPET Config MGMT Tool
PUPPET-Tool (2:51)
Puppet Master-Agent-Database (3:28)
Puppet-Manifest (4:51)
Puppet-Module-Forge (5:57)
Puppet Agent-Agrentless (3:07)
Puppet- PULL Model Steps (4:06)
CHEF Config MGMT Tool
CHEF- Config MGMT Tool (6:10)
CHEF-Termonology (7:29)
Anisble Config MGMT Tool
ANSIBLE-Control Station (3:10)
ANSIBLE-Tool (7:38)
ANSIBLE -PLayBook-Inventory (5:10)
ANISBLE - Templates-Variables (6:31)
JSON DATA Encoding
JSON Overview (7:33)
API Data Formats (7:43)
JSON Data Types (6:40)
JSON Syntax Rules (2:48)
JSON Data Interpretation (6:53)
Service Sets- SSID-BSS-ESS
Service Sets - Types (4:11)
SSID-Service Set Identifier (3:06)
Independent Basic Service Set - IBSS (1:47)
Basic Service Set -BSS (4:01)
Extended Service Set- ESS (4:27)
Distribution System (5:28)
RF-WLAN Standards
Frequency - Ranges (5:30)
Wireless Signal Basics (8:43)
EE- 802 Standards (4:02)
802.11 - Wireless LAN Standards (4:29)
802.11 - a - b - g (5:36)
802.11 n (3:07)
802.11 ac (5:30)
802.11 ax (2:53)
Wireless Architecture-WLC Deployments
Wireless Architectures (4:51)
Automonomous AP - Architecture (10:10)
Autonomous AP - Challenges (9:31)
Split-MAC Architecture- Lightweight AP (13:16)
LAP-WLC Binding (4:50)
CAPWAP Tunnels (6:41)
CAPWAP Messages (3:14)
WLC Deployments Methods (12:31)
Teach online with
Floating Default Routing
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock