Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
ICND2 2.0: Implementing a Scalable, Multiarea Network, OSPF Based Solution $74.95
ICND2 2.0: VPN Solutions and GRE Tunnels $74.95
ICND2 2.0: Wan Technology Overview and Serial Connections $74.95
ICND2 2.0: Establishing a WAN Connection Using Frame Relay $74.95
ICND2 2.0: Network Device Management $74.95

Bundle Price: $199.00
Total Savings: $175.75


ICND2 2.0: Implementing a Scalable, Multiarea Network, OSPF Based Solution

OSPF routing protocol supports a two-tier hierarchical structure. By utilizing a two-tier or multiarea OSPF design, you can increase the network scalability and reduce the load and utilization on routers due to fewer SPF calculations and smaller routing tables. This course first describes differences between single-area and multiarea OSPF design. The course describes how OSPF implementation should be planned as well as describes how to configure and verify multiarea OSPF design in an IPv4 network. OSPF is a link-state routing protocol and therefore it scales well with a growing network. However, this scalability introduces complexity in design, configuration, and maintenance. This course introduces OSPF neighbor states, which are important when troubleshooting OSPF adjacencies. It explains some of the common issues that arise with an OSPF network, provides a flow chart approach to troubleshooting these issues, and offers troubleshooting recommendations. OSPF is a widely used IGP. Upgrading the protocol to support IPv6 generated a number of significant changes to how the protocol behaves. Understanding the differences between OSPFv2 and OSPFv3 is required for the successful deployment and operation of an IPv6 network that is using OSPF for routing. This course ends by describing OSPFv3, which is the IPv6-capable version of the OSPF routing protocol, and describes its operations and implementation.
  • match single-area and multiarea OSPFs with their descriptions
  • describe commands used to configure a multiarea OSPF
  • describe commands used in verifying OSPFs
  • Not Applicable
  • identify potential causes of OSPF neighbor issues
  • identify how to troubleshoot OSPF routing table issues
  • Not Applicable
  • describe the key characteristics of OSPFv3
  • configure OSPFv3
  • verify OSPFv3 configuration
  • Not Applicable

ICND2 2.0: VPN Solutions and GRE Tunnels

Cisco VPN solutions provide an Internet-based WAN infrastructure for connecting branch offices, home offices, business partner sites, and remote telecommuters to all or portions of a company network. With cost-effective, high-bandwidth Internet connectivity that is secured by encrypted VPN tunnels, you can reduce WAN bandwidth costs while increasing connectivity speeds. This course describes the benefits of VPN implementation. GRE is a tunneling protocol that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork. By connecting multiprotocol subnetworks in a single-protocol backbone environment, IP tunneling using GRE enables network expansion across a single-protocol backbone environment. This course describes GRE tunneling, as well as how to configure and verify a GRE tunnel.
  • describe the advantages of VPNs
  • identify the functions of IPsec
  • describe a GRE tunnel
  • identify steps to configure a GRE tunnel
  • Not Applicable

ICND2 2.0: Wan Technology Overview and Serial Connections

As an enterprise grows beyond a single location, it needs to interconnect LANs in various locations using a WAN. There are several technologies that are involved in the functioning of WANs, including hardware devices and software functions. This course describes the functions and characteristics of WANs and contrasts them with LANs. The course also explores how WANs relate to the OSI reference model in their design and function and which major hardware components are typically used in WAN environments. One of the most common types of WAN connection is the point-to-point connection. Point-to-point connections are used to connect LANs to service provider WANs and to connect LAN segments within an enterprise network. A LAN-to-WAN, point-to-point connection is also referred to as a serial connection or leased-line connection. WAN services are typically leased from a service provider. Some WAN services operate as Layer 2 connections between your remote locations and are typically provided by a telco provider over its WAN switches. PPP emerged as an encapsulation protocol for transporting IP traffic over point-to-point (leased line) serial connections. PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. This course highlights the operation, configuration, and verification of PPP.
  • identify reasons why WANs are needed
  • distinguish different WAN devices
  • describe layer 2 WAN protocols
  • identify a WAN link option in a scenario
  • describe commands used to configure a serial interface
  • distinguish between the HDLC and Point-to-Point protocols
  • configure a serial link with PPP encapsulation
  • describe PAP and CHAP authentication
  • configure CHAP authentication for PPP
  • Not Applicable
  • identify the high-level steps involved in troubleshooting PPP encapsulation
  • Not Applicable

ICND2 2.0: Establishing a WAN Connection Using Frame Relay

Frame Relay is a standardized WAN technology that is a well-proven, packet-switching, connection-oriented technology that is used to interconnect remote sites. This course describes the basic functionality of Frame Relay, including topologies, reachability issues, and LMI signaling. The course also describes how to configure basic Frame Relay and Frame Relay over point-to-point and multipoint subinterfaces. The course concludes with verification of Frame Relay operations.
  • describe the basic functionality of Frame Relay
  • describe the purpose of DLCIs in a Frame Relay network
  • match Frame Relay topologies to their descriptions
  • recognize potential solutions to Frame Relay reachability issues
  • describe Frame Relay LMI signaling
  • describe Frame Relay address mappings and Inverse ARP
  • compare the differences between point-to-point and multipoint Frame Relay
  • recognize when to configure a static Frame Relay map
  • identify the commands used to configure point-to-point Frame Relay
  • identify commands for configuring multipoint Frame Relay
  • Not Applicable
  • identify the Frame Relay show commands that you can use to verify that Frame Relay is running as intended
  • Not Applicable

ICND2 2.0: Network Device Management

Network staff is responsible for managing each device on the network according to best industry practices and for reducing device downtime. This course provides an overview of some of the tools for monitoring and troubleshooting Cisco devices. SNMP basic components and operation are explained. A graphing tool can use SNMP to periodically poll an SNMP agent (for example, a router) and graph the values. Syslog is another useful protocol that allows a network device to send event notification messages to a centralized logging server. The course also explains the NetFlow protocol. The NetFlow protocol creates an environment and the tools to understand network traffic and how it is flowing. When a Cisco router boots, it performs a series of steps in a particular order. At several points during the process, the router makes a decision about the next step to take. Knowledge of the boot sequence can be of great help when troubleshooting a Cisco router and also when adjusting its configuration. Carefully managing Cisco IOS images and configuration files reduces device downtime and maintains best practices. Cisco IOS image files contain the Cisco IOS Software that is required for a Cisco device to operate. The device configuration files contain a set of user-defined configuration commands that customize the functionality of a Cisco device. This course describes the steps in the router boot sequence and the procedures and commands that are required to manage Cisco IOS images, configuration files, and devices on the network. This course concludes with an explanation of the universality of Cisco IOS images and the concept behind licensing. The Cisco IOS Software Activation feature is an orchestrated collection of processes and components to activate Cisco IOS Software feature sets by obtaining and validating Cisco software licenses. With the Cisco IOS Software Activation feature, you can enable licensed features and register licenses.
  • describe the purpose of SNMP
  • describe how data is obtained from an SNMP agent
  • describe how to configure a Cisco device for SNMP access
  • match elements of syslog messages to their descriptions in an example
  • recognize what can be achieved with NetFlow technology
  • recognize the meaning of commands for configuring NetFlow on a Cisco device
  • Not Applicable
  • distinguish between the major internal components of a router
  • describe the functions of ROM in a Cisco router
  • sequence the events that occur during a router boot
  • identify the correct change to the boot information in the configuration register in a scenario
  • describe the process of locating the Cisco IOS image
  • explain an IOS image filename
  • sequence the steps to upgrade Cisco IOS images
  • recognize how to merge a configuration from the TFTP server with the running configuration of the RAM
  • sequence the steps to perform a password recovery on a Cisco router
  • Not Applicable
  • recognize features of different technology package licenses
Register Now
ICND2 2.0: Interconnecting Cisco Networking Devices Part 4 e-learning bundle
  • Course ID:
    252749
  • Duration:
    8 hours
  • Price:
    $199