| SCHEDULE CHƯƠNG TRÌNH SD-WAN 300-415 | ||
| STT | CHỦ ĐỀ BÀI HỌC | |
| 1 | Opening | |
| Chapter 1. Introduction to Cisco Software-Defined Wide Area Networking (SD-WAN) |
||
| 2 | Networks of Today with Common Business and IT Trends | |
| 3 | Introduction to Cisco Software-Defined WAN (SD-WAN) | |
| Chapter 2. Cisco SD-WAN Components | ||
| 4 | Data Plane, Management Plane, Control Plane and Orchestration Plane | |
| 5 | Multi-Tenancy Options and Deployment Options | |
| Chapter 3. Control Plane and Data Plane Operations | ||
| 6 | Control Plane Operations: OMP Routes TLOC Routes Service Routes |
|
| 7 | Data Plane Operations: Full Cone NAT Symmetric NAT Address Restricted Cone NAT Port Restricted Cone NAT |
|
| Chapter 4. Onboarding and Provisioning | ||
| 8 | Configuration Templates | |
| 9 | Developing and Deploying Templates | |
| 10 | Onboarding Devices | |
| Chapter 5. Introduction to Cisco SD-WAN Policies | ||
| 11 | Purpose, types of Cisco SD-WAN Policies | |
| 12 | Centralized Policies Affect the Control Plane and Data Plane | |
| 13 | Cisco SD-WAN Policy Administration, Activation, and Enforcement | |
| Chapter 6. Centralized Control Policies | ||
| 14 | Centralized Control Policy Overview | |
| 15 | Use Case 1: Isolating Remote Branches from Each Other Use Case 2: Enabling Branch-to-Branch Communication Through Data Centers Use Case 3: Traffic Engineering at Sites with Multiple Routers |
|
| 16 | Use Case 4: Preferring Regional Data Centers for Internet Access Use Case 5: Regional Mesh Networks Use Case 6: Enforcing Security Perimeters with Service Insertion |
|
| 17 | Use Case 7: Isolating Guest Users from the Corporate WAN Use Case 8: Creating Different Network Topologies per Segment Use Case 9: Creating Extranets and Access to Shared Services |
|
| Chapter 7. Centralized Data Policies | ||
| 18 | Centralized Data Policy Overview | |
| 19 | Use Case 10: Direct Internet Access for Guest Users Use Case 11: Direct Cloud Access for Trusted Applications |
|
| 20 | Use Case 12: Application-Based Traffic Engineering Use Case 13: Protecting Corporate Users with a Cloud-Delivered Firewall Use Case 14: Protecting Applications from Packet Loss |
|
| Chapter 8. Application-Aware Routing Policies | ||
| 21 | The Mechanics and Constructing of an App-Route Policy | |
| 22 | Mapping Traffic Flows to a Transport Tunnel and Monitoring Tunnel Performance | |
| Chapter 9 Localized Policies | ||
| 23 | Localized Control Policies and Localized Data Policies | |
| 24 | Quality of Service Policies | |
| Chapter 10 Cisco SD-WAN Security | ||
| 25 | Application-Aware Enterprise Firewall | |
| 26 | Intrusion Detection and Prevention | |
| 27 | vManage Authentication and Authorization | |
| Chapter 11. Cisco SD-WAN Cloud onRamp | ||
| 28 | Cisco SD-WAN Cloud onRamp | |
| 29 | Cloud onRamp for SaaS, IaaS and Colocation | |
| 30 | Infrastructure and Software as a Service | |
| 31 | Redundancy and High Availability | |
| Chapter 12. Cisco SD-WAN Design and Migration | ||
| 32 | Cisco SD-WAN Design Methodology and Migration Preparation | |
| 33 | Cisco SD-WAN Data Center Design and Branch Design | |
| 34 | Cisco SD-WAN Overlay and Underlay Integration | |
| Chapter 13. Provisioning Cisco SD-WAN Controllers in a Private Cloud |
||
| 35 | SD-WAN Controller Functionality Recap and Certificates | |
| 36 | vManage Controller, vBond Controller and vSmart Controller Deployment | |
| 37 | Summary | |
| 38 | Final LAB | |
| 39 | Final Test | |
X
-
Schedule chương trình sd-wan 300-415
Tags: None