CCNP Data Center Application Centric Infrastructure 300-620 DCACI Complete Video Course

CCNP Data Center Application Centric Infrastructure 300-620 DCACI Complete Video Course

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 170 Lessons (22h 03m) | 4.38 GB

CCNP Data Center ACI Implementation DCACI 300-620 (DCACI) Complete Video Course is a unique video course that provides a solid understanding of ACI Data Center technologies as well as the CCNP Data Center DCACI exam. This complete video course is a comprehensive guide for individuals who are pursuing the Cisco CCNP Data Center certification with a focus on ACI. Beyond preparing viewers for exam success, this course has also been organized for networking professionals who want to learn the skills necessary for designing, configuring, and troubleshooting data center networks using Cisco ACI. This course does assume CCNA-level knowledge.

The course is presented by Ammar Ahmadi, who has been working with ACI fabrics for almost a decade. Ammar provides demonstrations and walk-throughs while imparting all information necessary for exam success.

Topics include

  • Module 1: From Introduction to Initialization
  • Module 2: ACI Fundamentals
  • Module 3: External Connectivity
  • Module 4: Integrations
  • Module 5: Management and Monitoring
  • Module 6: ACI Anywhere
  • Module 7: Exam Preparation and Continuous Learning

Learn How To

  • Prepare for the DCACI 300-620 Certification Exam
  • Deploy and manage the Cisco Nexus 9000 series switches in Cisco Application Centric Infrastructure (Cisco ACI) mode
  • Configure and manage Cisco Nexus 9000 series switches in ACI mode
  • Connect the Cisco ACI fabric to external networks and services
  • Navigate the fundamentals of Virtual Machine Manager (VMM) integration
  • Implement key capabilities such as fabric discover, policies, connectivity, VMM integration, and more

Who Should Take This Course

This Complete Video Course (CVC) serves as a comprehensive guide for individuals who are pursuing the Cisco CCNP Data Center certification with a focus on ACI. This CVC helps any network professionals who want to learn the skills necessary for designing, configuring, and troubleshooting data center networks using Cisco ACI.

Module 1, “From Introduction to Initialization,” begins with the basics. It briefly discusses the state of the industry and some reasons for the immense popularity of ACI. It then moves on to prevalent ACI topologies and the hardware required to build an ACI fabric. The fabric initialization process and some of the tasks that are usually performed right after a fabric is initialized are also covered, as well as the ACI GUI, the CLI, and the ACI object hierarchy together.

Module 2, “ACI Fundamentals,” covers the most important objects within the ACI object hierarchy, starting with objects that form tenants. The module then dives in to access policies, configuring ports within ACI, and creating basic contracts for application whitelisting.

Module 3, “External Connectivity,” shifts focus to address connectivity from ACI to the outside world. First up is L3Outs, then some brownfield data center migrations into ACI.

Module 4, “Integrations,” delves into the integration versatility of ACI. ACI can integrate with a number of industry solutions by executing API calls against these solutions. The DCACI exam calls out two key areas of integrations: The first is integrations with VMWare vSphere, and the second is service graphs.

Module 5, “Management and Monitoring,” digs deeper into management by looking at inband management, Syslog, SNMP, and role-based access control.

Module 6, “ACI Anywhere,” discusses how ACI enables some pretty advanced architectures, including solutions involving ACI Multi-Pod and ACI Multi-Site.

Module 7, “Exam Preparation and Continuous Learning,” covers exam preparation and ACI readiness for the real world.

Table of Contents

Introduction
1 CCNP Data Center Application Centric Infrastructure 300-620 DCACI: Introduction

Module 1: From Introduction to Initialization
2 Module introduction

Lesson 1: The Big Picture of Why ACI
3 Learning objectives
4 1.1 Understanding the Shortcomings of Traditional Networks
5 1.2 Understanding the Benefits of ACI – Part 1
6 1.3 Understanding the Benefits of ACI – Part 2

Lesson 2: ACI Hardware and Topologies
7 Learning objectives
8 2.1 ACI Topologies
9 2.2 APIC Clusters
10 2.3 Spine Hardware Options
11 2.4 Leaf Hardware Options

Lesson 3: Initializing an ACI Fabric
12 Learning objectives
13 3.1 Planning Fabric Initialization
14 3.2 Switch Discovery Process
15 3.3 Fabric Discovery Phases
16 3.4 Switch Discovery States
17 3.5 Initializing an ACI Fabric – Part 1
18 3.6 Initializing an ACI Fabric – Part 2
19 3.7 Pre-Staging Switch Activation
20 3.8 Configuring Out-of-Band Management
21 3.9 Understanding Post-Initialization Connectivity
22 3.10 Upgrading an ACI Fabric
23 3.11 Performing Configuration Backups
24 3.12 Restoring Configurations from Backups
25 3.13 Configuring NTP
26 3.14 Configuring DNS Lookups
27 3.15 Taking a Look at COOP Configuration
28 3.16 Converting Fabric Ports to Access Ports

Lesson 4: Exploring ACI
29 Learning objectives
30 4.1 ACI Access Methods
31 4.2 The ACI Object Model
32 4.3 Understanding and Managing Faults
33 4.4 Monitoring Policies in ACI
34 4.5 Understanding Health Scores
35 4.6 Understanding and Managing Events
36 4.7 Understanding and Using Audit Logs

Module 2: ACI Fundamentals
37 Module introduction

Lesson 5: Understanding Tenant Objects
38 Learning objectives
39 5.1 The Challenge of Designing around Subnet Boundaries
40 5.2 Understanding the Basic Objects within Tenants
41 5.3 Classifying Endpoints into EPGs
42 5.4 Contract Security Enforcement Basics
43 5.5 Enabling L3 Connectivity Outside the Fabric
44 5.6 Tenant Hierarchy in Review

Lesson 6: Understanding Access Policies
45 Learning objectives
46 6.1 Understanding Pools
47 6.2 Understanding Domains
48 6.3 VLAN Pool and Domain Design Examples
49 6.4 Understanding AAEPs
50 6.5 Implementing Pools, Domains, and AAEPs
51 6.6 Understanding Interface Policies
52 6.7 Understanding Interface Policy Groups
53 6.8 Sample Interface Policies and Policy Groups
54 6.9 Implementing Interface Policies
55 6.10 Understanding Switch Policies
56 6.11 Understanding Switch Policy Groups
57 6.12 Mapping Interface Policy Groups to Ports
58 6.13 Sample Switch and Interface Profile Designs
59 6.14 Implementing Profiles and Selectors
60 6.15 Access Policies and Tenancy in Review

Lesson 7: Implementing Access Policies
61 Learning objectives
62 7.1 Configuring Individual Ports
63 7.2 Configuring Port-Channels
64 7.3 Configuring vPC Domains and vPCs
65 7.4 Configuring Fabric Extenders
66 7.5 Configuring Breakout Ports
67 7.6 Modifying QoS Settings

Lesson 8: Overlaying Tenant Policies onto Ports
68 Learning objectives
69 8.1 ACI Endpoint Learning and Forwarding
70 8.2 Implementing Basic Tenant Policies – Part 1
71 8.3 Implementing Basic Tenant Policies – Part 2
72 8.4 Deploying a 2-Tier Application – Part 1
73 8.5 Deploying a 2-Tier Application – Part 2
74 8.6 Deploying a 2-Tier Application – Part 3
75 8.7 Deploying a 2-Tier Application – Part 4
76 8.8 Configuring AAEP EPGs
77 8.9 Verifying Endpoint Learning and Forwarding

Module 3: External Connectivity
78 Module introduction

Lesson 9: L3Outs
79 Learning objectives
80 9.1 L3Out Fundamentals
81 9.2 MP-BGP Route Reflectors
82 9.3 Implementing an EIGRP L3Out
83 9.4 Tagging Routes
84 9.5 Implementing an OSPFv2 L3Out
85 9.6 Preferred Group Member Settings
86 9.7 Setting OSPF Metrics and Metric Types
87 9.8 Modifying an L3Out for Firewall Peering
88 9.9 Implementing OSPFv3 L3Outs
89 9.10 Implementing BGP L3Outs – Part 1
90 9.11 Implementing BGP L3Outs – Part 2
91 9.12 Implementing BGP L3Outs – Part 3
92 9.13 Implementing BFD on L3Outs
93 9.14 Implementing BGP Community Strings
94 9.15 Implementing Route Filtering
95 9.16 Advertising Default Routes via L3Outs
96 9.17 Granting Differing Access to External Users – Part 1
97 9.18 Granting Differing Access to External Users – Part 2
98 9.19 Granting Differing Access to External Users – Part 3
99 9.20 Granting Differing Access to External Users – Part 4
100 9.21 Using the Established Bit in Contracts

Lesson 10: Migrating Existing Networks into ACI
101 Learning objectives
102 10.1 Spanning-Tree and ACI
103 10.2 Understanding Network-Centric Deployments
104 10.3 Tenant Design Considerations for Migrations
105 10.4 ACI and STP TCNs
106 10.5 Comparing EPG Extensions and L2Outs
107 10.6 Implementing EPG Extension
108 10.7 Implementing Protections Against STP TCNs
109 10.8 Migrating Overlapping VLANs into ACI – Part 1
110 10.9 Migrating Overlapping VLANs into ACI – Part 2
111 10.10 Implementing L2Outs – Part 1
112 10.11 Implementing L2Outs – Part 2
113 10.12 Migrating Default Gateways into ACI

Module 4: Integrations
114 Module introduction

Lesson 11: VMWare vSphere Integration
115 Learning objectives
116 11.1 vSphere Networking Primer
117 11.2 Implementing Basic Connectivity to ESXi Servers – Part 1
118 11.3 Implementing Basic Connectivity to ESXi Servers – Part 2
119 11.4 Implementing Basic Connectivity to ESXi Servers – Part 3
120 11.5 Implementing VMM Integration – Part 1
121 11.6 Implementing VMM Integration – Part 2
122 11.7 Implementing vSwitch Policies
123 11.8 Pushing Port-Groups to vCenter – Part 1
124 11.9 Pushing Port-Groups to vCenter – Part 2
125 11.10 Integrating a VDS into Dual-port Servers – Part 1
126 11.11 Integrating a VDS into Dual-port Servers – Part 2

Lesson 12: Service Graphs
127 Learning objectives
128 12.1 Service Graph Basics
129 12.2 Service Graph Design Options
130 12.3 Deployment Modes
131 12.4 Implementing Unmanaged Firewall Service Graphs – Part 1
132 12.5 Implementing Unmanaged Firewall Service Graphs – Part 2
133 12.6 Implementing Managed Firewall Service Graphs – Part 1
134 12.7 Implementing Managed Firewall Service Graphs – Part 2
135 12.8 Implementing Managed Firewall Service Graphs – Part 3
136 12.9 Implementing Managed Firewall Service Graphs – Part 4

Module 5: Management and Monitoring
137 Module introduction

Lesson 13: Implementing Management
138 Learning objectives
139 13.1 Enforcing Custom Contracts for OOB Management
140 13.2 Understanding Inband Management
141 13.3 Access Policies for Inband Management
142 13.4 Assigning IPs and EPGs to Inband Management
143 13.5 Enabling Inband Communication via L3Outs and Contracts

Lesson 14: Monitoring ACI Using Syslog and SNMP
144 Learning objectives
145 14.1 Understanding System Messages
146 14.2 Implementing Basic Syslog Forwarding
147 14.3 Implementing Syslog in Multi-Tenant Environments
148 14.4 Understanding SNMP
149 14.5 Configuring ACI for SNMP

Lesson 15: Implementing AAA and RBAC
150 Learning objectives
151 15.1 Understanding Security Domains
152 15.2 Understanding Privileges and Roles
153 15.3 Creating Local Users and Assigning Access
154 15.4 Tweaking Roles and User Access
155 15.5 Implementing Custom RBAC Rules
156 15.6 Understanding Login Domains
157 15.7 Configuring ACI for LDAP Authentication
158 15.8 Configuring ACI for TACACS+ Authentication and Authorization
159 15.9 Understanding the Required ISE Configuration

Module 6: ACI Anywhere
160 Module introduction

Lesson 16: ACI Multi-Pod and Multi-Site
161 Learning objectives
162 16.1 ACI Multi-Pod Use Cases
163 16.2 Basic Demo of Multi-Site Orchestrator
164 16.3 ACI Multi-Site Use Cases
165 16.4 Comparing Multi-Site and Multi-Pod

Module 7: Exam Preparation and Continuous Learning
166 Module introduction

Lesson 17: Exam Preparation Advice
167 Learning objectives
168 17.1 Exam Preparation Advice
169 17.2 Next Steps

Summary
170 CCNP Data Center Application Centric Infrastructure 300-620 DCACI: Summary

Homepage