Advanced AOS-CX Switching (01126289)
Verwerf het hoogste niveau van expertise met Aruba bekabelde switching oplossingen, inclusief de mogelijkheid om Aruba Switching campus LAN oplossingen op bedrijfsniveau te implementeren en te optimaliseren.
Bereidt voor op deze certificering
Aruba Certified Switching Expert (ACSX)
Beschrijving
Deze cursus is opgezet om de student te helpen dit hoogste niveau van expertise te verkrijgen, met Aruba bekabelde switching oplossingen, inclusief het vermogen om Aruba Switching campus LAN oplossingen op bedrijfsniveau te implementeren en te optimaliseren. De cursus richt zich op het interpreteren van complexe netwerkarchitecturen en klantvereisten om multi-vendor netwerkoplossingen te implementeren, te monitoren, te troubleshooten en te optimaliseren. De student wordt aangemoedigd om kritische denkvaardigheden te gebruiken om complexe problemen in de omgeving op te lossen die buiten de expertise van de professional level integrator liggen. Tijdens de uitvoering van zijn/haar primaire taken, wordt de cursist aangemoedigd om ook het hoogste niveau van strategisch denken en probleemoplossing te demonstreren. Dit omvat het definiëren van operationele plannen voor gewenste resultaten met het doel te voldoen aan onmiddellijke vereisten en aan verwachte toekomstige groeimogelijkheden. Deze cursus bestaat voor ongeveer 35% uit colleges en voor 65% uit hands-on laboefeningen in scenario’s.
Vereiste voorkennis bij deze training
De aanbevolen voorkennis voor deze cursus is het volgen van de Implementing ArubaOS-CX Solutions course of het behalen van het Aruba Certified Switching Professional (ACSP) certificeringsexamen.
Doelgroep
De ideale kandidaat voor deze cursus is zeer bekend met Aruba bekabelde switching oplossingen, inclusief het vermogen om Aruba Switching campus LAN oplossingen op bedrijfsniveau te implementeren en te optimaliseren. Typische kandidaten in de ASTS cursus bereiden zich voor op de ACSX schriftelijke en/of ACSX praktische examens.
Lijst van onderwerpen
- Plan The Wired Network Solutions
- Gather customer requirements and network design
- Information gathering steps and questionnaire
- Create and use a Proof-of-Concept (POC) plan
- Creating and using a golden configuration
- Troubleshooting
- Diagnostic Principles
- Troubleshooting Principles
- Troubleshooting Zones
- Troubleshooting Components
- Problem-solving methodology
- Identification and Analysis
- Hypothesis and Validation
- Implement and Verify
- Log files and debugging
- Assess and set desired debugging states
- Remote logging and log rotation
- Event and Account logging
- Password reset
- Diagnostic Commands
- Resource utilization
- Capacities and Environment
- Diagnostic tools and diag on-demand
- Support Files
- Traffic Analysis
- Mirroring concepts and configuration
- Mirroring validation
- Wireshark setup and usage
- Wireshark display filters
- Diagnostic Principles
- Monitoring and Automation Tools
- REST API
- Network Automation and REST API
- REST methods
- Using the REST interface
- Sending REST API Requests
- Swagger resource reference and interface
- cURL CLI tool and library
- Postman
- Network Analytic Engine
- Overview
- Scripts and agents
- Script types and sources
- NAE maximums
- Script components
- Agent functions
- Troubleshooting
- Other Monitoring
- IP SLA use and configuration
- SNMPv3 use and configuration
- NetEdit topology and logs
- REST API
- VSX, VSF, and Layer 2 Technologies
- VSF
- Overview
- Stack requirements
- Member roles and links
- Link failure and split detection
- Split stack link and member failures
- VSF Troubleshooting
- Status and members
- Links and topology
- Removing a VSF member
- VSX
- Overview
- Components
- Aggregation: Single routing model
- Aggegation: Multiplle VRF routing
- Virtual and System MAC guidance
- VSX Best Practices
- Nodes, bandwidth, and ISL
- Roles and synchronization
- Configuration sync
- LAG and MSTP configuration
- SVI configuration
- VSX Troubleshooting
- Status and LAG interfaces
- Configuration and VSX sync
- Debugging
- Configuration consistency
- Link/interface status
- MAC/peer consistency
- LACP interfaces
- Configuration parser
- VSX Split Brain
- Analyze down conditions and results
- Analyze failure scenarios
- VSF
- Layer 3 Routing and OSPF
- Static Routing
- Overview
- Default route
- Floating static routes
- Static Routes with BFD
- Routes with Tags
- Policy Based Routing
- Overview
- Configuration
- Validation
- VRF
- OSPF Single Area
- Review
- Adjacencies
- Route table vs. diagram
- Neighbor table vs. diagram
- LSDB vs diagram
- LSDB vs network types
- OSPF Multi-area
- OSPF review
- LSA types and usage
- ABRs
- Route aggregation and filtering
- Interface costs
- Passive interfaces
- Authentication
- BFD
- Best practice and troubleshooting review
- BGP
- BGP Concepts and Peers
- Use case and features
- Configure BGP peers
- Sessions and states
- eBGP multihop
- iBGP full-mesh
- Validate BGP peers
- BGP Advertisement
- Three key points about BGP advertisements
- iBGP and next-hop-self
- BGP reachability requirement
- The network command
- Aggregate-address command
- BGP Metrics and Tuning
- Path selection criteria
- Prefix lists and route maps
- Weight
- Local Preference
- AS path length
- MED
- Route Control
- Reasons to control eBGP routes
- Route control implementation
- Route control validation
- Inbound route control
- Peer groups
- Route reflectors
- BGP Concepts and Peers
- Route Redistribution
- Intro to Redistribution
- Overview
- Redistribute static to OSPF
- Static to OSPF configuration and validation
- OSPF Type 1 vs Type 2 routes
- Using and tuning the default metric
- Compare tuning techniques
- Prefix list tuning and validation
- Redistribute OSPF to BGP
- Scenario
- Configuration
- Network statements and route maps
- Advanced Route Redistribution
- Scenario
- AS-path list
- Improve BGP convergence times
- Route tags
- Intro to Redistribution
- VRF and Route Leaking
- VRF Overview and Configuration
- Overview
- Configuration
- Verification
- VRF Route Leaking
- Methods
- Restrictions and limitations
- Static route leaking configuration and validation
- Dynamic route leaking configuration and validation
- VRF Overview and Configuration
- Multicast
- Multicast
- Introduction
- IP address assignments
- Network Access and L2 Multicast
- Switching multicast frames
- MAC address mapping
- IGMP – v1, v2, v3
- IGMPv3 messages – membership report, querier election,
- IGMPv3 Snooping
- IGMPv3 Configuration and verification
- VSX and IGMPv3
- IP Multicast at Layer 3
- Overview
- Tree types Shared/RP, source/SPF trees
- Group states
- RPF
- PIM
- Versions
- Messages
- PIM-SIM
- Designated Routers
- Rendezvous Point
- Build-up process
- Wireshark analysis
- RP Configuration
- Static RP
- Dynamic RP
- BSR mechanism
- Wireshark analysis
- VSX and PIM
- Multicast Deployment
- Overview
- PIM Configuration
- Multicast Troubleshooting
- Multicast
- QoS
- Quality of Service
- Overview
- Traffic characterization
- Differentiated Services model
- AOS-CX QoS processing
- Ingress Stage
- Rate Limiting
- Configuration
- Verification
- Prioritization Stage
- Classifier and Class of service
- Marking and Trust
- Configuration and Verification
- Queuing Stage
- Configuration and verification
- Scheduler Stage
- Strict Priority
- DWRR and WFQ
- Configuration and verification
- Remark QoS
- Configuration
- Verification
- Quality of Service
- Dynamic Segmentation
- Overview
- Objective and benefits
- Port-based vs user-based tunneling
- UBT components
- Understanding UBT
- Tunnel establishment
- Role assignment and redirection
- Infrastructure requirements
- Broadcast and multicast traffic
- Configuration and Wireshark analysis
- Verification commands
- Deployment Using NetEdit
- Configure dynamic segmentation using NetEdit
- Verify dynamic segmentation using NetEdit
- Overview
- Network Security
- Access Control Lists
- Overview
- Applying ACLs
- Object Groups
- ACL verification
- Counting and logging
- ACL resource utilization
- Classifier Policies
- Overview
- Configuration
- Application
- Verification
- Control Plane Policing
- Overview
- Configuration
- Verification
- Local User and Group Management
- Local AAA
- Built-in user groups
- User-defined user groups
- TACACS+ Management
- Remote AAA using TACACS+
- Communication with TACACS+ server
- Configure and verify AAA using TACACS+
- DHCP Snooping and ARP Inspection
- DHCP snooping configuration and verification
- Dynamic ARP operation, configuration, and verification
- Access Control Lists
- IPv6
- IPv6
- Features
- Headers
- Extension headers
- Address representation
- Address Types
- Unicast
- Multicast
- Anycast
- ICMPv6
- Overview
- Neighbor discovery
- Manual IPv6 Addressing
- Configuration
- Verification
- DAD
- Dynamic IPv6 Addressing
- Router Advertisements
- SLAAC
- DHCPv6
- IPv6 Routing
- Static
- OSPFv3
- IPv6 Access Control Lists
- Configuration
- Verification
- IPv6
De prijs voor deze cursus is exclusief eventuele kosten voor het afleggen van een examen. Indien na de opleiding een examenvoucher wordt afgenomen, zal een extra factuur worden verstuurd.